Latest Update 2025-2026
Which TCP/IP layer is responsible for path determination and end-to-end forwarding of
datagrams? a. The Application layer b. The Transport layer c. The Internet layer d. The Link layer
- Answers c. The Internet layer
What information is part of the encapsulation done at the Link layer? a. Source and destination
MAC addresses b. Source and destination IP addresses c. Source and destination port numbers
d. Source and destination email addresses - Answers a. Source and destination MAC addresses
Which of the following is NOT a function of the control plane in a router? a. To exchange control
messages with other routers b. To collaborate with other routers to find the best way to forward
data packets c. To populate the routing table and the tunnel table d. To forward data packets
towards their destination - Answers d. To forward data packets towards their destination
Which of the following shows a typical data packet flow when egressing a Nokia 7750 SR? a.
SF/CPM -> MDA -> IOM -> SFP b. SF/CPM -> SFP -> IOM -> MDA c. SF/CPM -> IOM -> MDA ->
SFP d. MDA -> IOM -> SF/CPM -> SFP - Answers c. SF/CPM -> IOM -> MDA -> SFP
Which of the following about MD-CLI is FALSE? a. MD-CLI allows atomic transactions. b.
Multiple users may edit the global candidate configuration concurrently. c. Configuration
changes are activated when a candidate configuration datastore is committed. d. Uncommitted
configuration changes are saved when a user exits the private configuration edit mode. -
Answers d. Uncommitted configuration changes are saved when a user exits the private
configuration edit mode.
If one user is in the private configuration edit mode and another one is in the read-only
configuration edit mode, which candidate configuration datastore do they have access to? a.
Both users have access to the global configuration datastore. b. Both users have access to the
same private configuration datastore. c. The read-only user has access to the global
configuration datastore and the private user has access to its own configuration datastore. d.
The read-only user has access to the running configuration datastore and the private user has
access to the global configuration datastore. - Answers c. The read-only user has access to the
global configuration datastore and the private user has access to its own configuration
datastore.
Which of the following actions exits the MD-CLI implicit configuration mode? a. Navigating to a
CLI context outside the configuration branch b. Navigating to the root CLI context c. Issuing a
full show command d. Issuing the quit-config command - Answers b. Navigating to the root CLI
context
Which of the following displays the hierarchical structure of the available CLI commands at the
current context level? a. show b. info c. tree d. help - Answers c. tree
, Which of the following is NOT a valid log destination in a Nokia 7750 SR? a. Main b. CLI c.
Syslog d. Console - Answers a. Main
Which of the following is NOT a characteristic of a hub? a. It can interconnect hosts located in
the same local area network. b. It replicates Ethernet frames across all ports except the
receiving port. c. It inspects layer-2 frame headers. d. Devices connected to it must operate in
half-duplex mode. - Answers c. It inspects layer-2 frame headers
Which address type is used to send frames to all devices in a Local Area Network? a. Anycast b.
Multicast c. Broadcast d. Unicast - Answers c. Broadcast
What happens when a switch receives an Ethernet frame with an unknown source MAC address
and a destination MAC address of ff:ff:ff:ff:ff:ff? a. The destination MAC address is saved in the
MAC FDB, and the frame is discarded. b. The destination MAC address is saved in the MAC FDB,
and the frame is flooded to all ports except the receiving port. c. The source MAC address is
saved in the MAC FDB, and the frame is discarded. d. The source MAC address is saved in the
MAC FDB, and the frame is flooded to all ports except the receiving port. - Answers d. The
source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the
receiving port
14. Which of the following statements about VLAN stacking is FALSE? a. It allows a service
provider to support customers that use overlapping VLAN IDs. b. It increases the number of
customers sending VLAN-tagged traffic that a service provider can support. c. It increases the
size of the VLAN ID field in the Ethernet header. d. It allows a service provider to add another
VLAN tag to traffic. - Answers c. It increases the size of the VLAN ID field in the Ethernet header
15. Which of the following statements about LAG is FALSE? a. It aggregates multiple physical
links into a single logical link. b. It improves performance by increasing bandwidth between
devices. c. It provides protection against link or node failure. d. It supports limited auto-
negotiation on member ports. - Answers c. It provides protection against link or node failure.
16. Which of the following protocols is used to prevent loops in Ethernet networks? a. LAG b.
STP c. ARP d. ICMP - Answers b. STP
17. Which of the following is used to connect multiple broadcast domains? a. Hub b. Switch c.
Router d. Repeater - Answers c. Router
18. Which of the following is NOT a Regional Internet Registry? a. ARIN b. IANA c. RIPE NCC d.
AfriNIC - Answers b. IANA
19. Which of the following is the broadcast address of the subnetwork to which host
172.16.176.135/24 belongs? a. 172.16.176.255 b. 172.16.191.255 c. 172.16.255.255 d.
172.255.255.255 - Answers a. 172.16.176.255
20. Which of the following is a unicast address that is assigned to two or more devices on the