100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Nokia Network Routing Specialist I (NRS I) Certification Exam Questions with Correct Answers Latest Update

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
08-10-2025
Written in
2025/2026

Nokia Network Routing Specialist I (NRS I) Certification Exam Questions with Correct Answers Latest Update Which TCP/IP layer is responsible for path determination and end-to-end forwarding of datagrams? a. The Application layer b. The Transport layer c. The Internet layer d. The Link layer - Answers c. The Internet layer What information is part of the encapsulation done at the Link layer? a. Source and destination MAC addresses b. Source and destination IP addresses c. Source and destination port numbers d. Source and destination email addresses - Answers a. Source and destination MAC addresses Which of the following is NOT a function of the control plane in a router? a. To exchange control messages with other routers b. To collaborate with other routers to find the best way to forward data packets c. To populate the routing table and the tunnel table d. To forward data packets towards their destination - Answers d. To forward data packets towards their destination Which of the following shows a typical data packet flow when egressing a Nokia 7750 SR? a. SF/CPM -> MDA -> IOM -> SFP b. SF/CPM -> SFP -> IOM -> MDA c. SF/CPM -> IOM -> MDA -> SFP d. MDA -> IOM -> SF/CPM -> SFP - Answers c. SF/CPM -> IOM -> MDA -> SFP Which of the following about MD-CLI is FALSE? a. MD-CLI allows atomic transactions. b. Multiple users may edit the global candidate configuration concurrently. c. Configuration changes are activated when a candidate configuration datastore is committed. d. Uncommitted configuration changes are saved when a user exits the private configuration edit mode. - Answers d. Uncommitted configuration changes are saved when a user exits the private configuration edit mode. If one user is in the private configuration edit mode and another one is in the read-only configuration edit mode, which candidate configuration datastore do they have access to? a. Both users have access to the global configuration datastore. b. Both users have access to the same private configuration datastore. c. The read-only user has access to the global configuration datastore and the private user has access to its own configuration datastore. d. The read-only user has access to the running configuration datastore and the private user has access to the global configuration datastore. - Answers c. The read-only user has access to the global configuration datastore and the private user has access to its own configuration datastore. Which of the following actions exits the MD-CLI implicit configuration mode? a. Navigating to a CLI context outside the configuration branch b. Navigating to the root CLI context c. Issuing a full show command d. Issuing the quit-config command - Answers b. Navigating to the root CLI context Which of the following displays the hierarchical structure of the available CLI commands at the current context level? a. show b. info c. tree d. help - Answers c. tree Which of the following is NOT a valid log destination in a Nokia 7750 SR? a. Main b. CLI c. Syslog d. Console - Answers a. Main Which of the following is NOT a characteristic of a hub? a. It can interconnect hosts located in the same local area network. b. It replicates Ethernet frames across all ports except the receiving port. c. It inspects layer-2 frame headers. d. Devices connected to it must operate in half-duplex mode. - Answers c. It inspects layer-2 frame headers Which address type is used to send frames to all devices in a Local Area Network? a. Anycast b. Multicast c. Broadcast d. Unicast - Answers c. Broadcast What happens when a switch receives an Ethernet frame with an unknown source MAC address and a destination MAC address of ff:ff:ff:ff:ff:ff? a. The destination MAC address is saved in the MAC FDB, and the frame is discarded. b. The destination MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port. c. The source MAC address is saved in the MAC FDB, and the frame is discarded. d. The source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port. - Answers d. The source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port 14. Which of the following statements about VLAN stacking is FALSE? a. It allows a service provider to support customers that use overlapping VLAN IDs. b. It increases the number of customers sending VLAN-tagged traffic that a service provider can support. c. It increases the size of the VLAN ID field in the Ethernet header. d. It allows a service provider to add another VLAN tag to traffic. - Answers c. It increases the size of the VLAN ID field in the Ethernet header 15. Which of the following statements about LAG is FALSE? a. It aggregates multiple physical links into a single logical link. b. It improves performance by increasing bandwidth between devices. c. It provides protection against link or node failure. d. It supports limited auto-negotiation on member ports. - Answers c. It provides protection against link or node failure. 16. Which of the following protocols is used to prevent loops in Ethernet networks? a. LAG b.

Show more Read less
Institution
Nokia Network Routing Specialist I
Course
Nokia Network Routing Specialist I









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Nokia Network Routing Specialist I
Course
Nokia Network Routing Specialist I

Document information

Uploaded on
October 8, 2025
Number of pages
5
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Nokia Network Routing Specialist I (NRS I) Certification Exam Questions with Correct Answers
Latest Update 2025-2026

Which TCP/IP layer is responsible for path determination and end-to-end forwarding of
datagrams? a. The Application layer b. The Transport layer c. The Internet layer d. The Link layer
- Answers c. The Internet layer

What information is part of the encapsulation done at the Link layer? a. Source and destination
MAC addresses b. Source and destination IP addresses c. Source and destination port numbers
d. Source and destination email addresses - Answers a. Source and destination MAC addresses

Which of the following is NOT a function of the control plane in a router? a. To exchange control
messages with other routers b. To collaborate with other routers to find the best way to forward
data packets c. To populate the routing table and the tunnel table d. To forward data packets
towards their destination - Answers d. To forward data packets towards their destination

Which of the following shows a typical data packet flow when egressing a Nokia 7750 SR? a.
SF/CPM -> MDA -> IOM -> SFP b. SF/CPM -> SFP -> IOM -> MDA c. SF/CPM -> IOM -> MDA ->
SFP d. MDA -> IOM -> SF/CPM -> SFP - Answers c. SF/CPM -> IOM -> MDA -> SFP

Which of the following about MD-CLI is FALSE? a. MD-CLI allows atomic transactions. b.
Multiple users may edit the global candidate configuration concurrently. c. Configuration
changes are activated when a candidate configuration datastore is committed. d. Uncommitted
configuration changes are saved when a user exits the private configuration edit mode. -
Answers d. Uncommitted configuration changes are saved when a user exits the private
configuration edit mode.

If one user is in the private configuration edit mode and another one is in the read-only
configuration edit mode, which candidate configuration datastore do they have access to? a.
Both users have access to the global configuration datastore. b. Both users have access to the
same private configuration datastore. c. The read-only user has access to the global
configuration datastore and the private user has access to its own configuration datastore. d.
The read-only user has access to the running configuration datastore and the private user has
access to the global configuration datastore. - Answers c. The read-only user has access to the
global configuration datastore and the private user has access to its own configuration
datastore.

Which of the following actions exits the MD-CLI implicit configuration mode? a. Navigating to a
CLI context outside the configuration branch b. Navigating to the root CLI context c. Issuing a
full show command d. Issuing the quit-config command - Answers b. Navigating to the root CLI
context

Which of the following displays the hierarchical structure of the available CLI commands at the
current context level? a. show b. info c. tree d. help - Answers c. tree

, Which of the following is NOT a valid log destination in a Nokia 7750 SR? a. Main b. CLI c.
Syslog d. Console - Answers a. Main

Which of the following is NOT a characteristic of a hub? a. It can interconnect hosts located in
the same local area network. b. It replicates Ethernet frames across all ports except the
receiving port. c. It inspects layer-2 frame headers. d. Devices connected to it must operate in
half-duplex mode. - Answers c. It inspects layer-2 frame headers

Which address type is used to send frames to all devices in a Local Area Network? a. Anycast b.
Multicast c. Broadcast d. Unicast - Answers c. Broadcast

What happens when a switch receives an Ethernet frame with an unknown source MAC address
and a destination MAC address of ff:ff:ff:ff:ff:ff? a. The destination MAC address is saved in the
MAC FDB, and the frame is discarded. b. The destination MAC address is saved in the MAC FDB,
and the frame is flooded to all ports except the receiving port. c. The source MAC address is
saved in the MAC FDB, and the frame is discarded. d. The source MAC address is saved in the
MAC FDB, and the frame is flooded to all ports except the receiving port. - Answers d. The
source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the
receiving port

14. Which of the following statements about VLAN stacking is FALSE? a. It allows a service
provider to support customers that use overlapping VLAN IDs. b. It increases the number of
customers sending VLAN-tagged traffic that a service provider can support. c. It increases the
size of the VLAN ID field in the Ethernet header. d. It allows a service provider to add another
VLAN tag to traffic. - Answers c. It increases the size of the VLAN ID field in the Ethernet header

15. Which of the following statements about LAG is FALSE? a. It aggregates multiple physical
links into a single logical link. b. It improves performance by increasing bandwidth between
devices. c. It provides protection against link or node failure. d. It supports limited auto-
negotiation on member ports. - Answers c. It provides protection against link or node failure.

16. Which of the following protocols is used to prevent loops in Ethernet networks? a. LAG b.
STP c. ARP d. ICMP - Answers b. STP

17. Which of the following is used to connect multiple broadcast domains? a. Hub b. Switch c.
Router d. Repeater - Answers c. Router

18. Which of the following is NOT a Regional Internet Registry? a. ARIN b. IANA c. RIPE NCC d.
AfriNIC - Answers b. IANA

19. Which of the following is the broadcast address of the subnetwork to which host
172.16.176.135/24 belongs? a. 172.16.176.255 b. 172.16.191.255 c. 172.16.255.255 d.
172.255.255.255 - Answers a. 172.16.176.255

20. Which of the following is a unicast address that is assigned to two or more devices on the

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
345
Member since
1 year
Number of followers
16
Documents
28823
Last sold
2 days ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

54 reviews

5
18
4
14
3
12
2
0
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions