Specialist I (NRS I)
Certification Exam Prep
(Latest 2026/ 2027
Update)EXAM
Which of the following shows a typical data packet flow when egressing a Nokia 7750
SR? a. SF/CPM -> MDA -> IOM -> SFP b. SF/CPM -> SFP -> IOM -> MDA c. SF/CPM -
> IOM -> MDA -> SFP d. MDA -> IOM -> SF/CPM -> SFP - ANSWERS-c. SF/CPM ->
IOM -> MDA -> SFP
Which of the following about MD-CLI is FALSE? a. MD-CLI allows atomic transactions.
b. Multiple users may edit the global candidate configuration concurrently. c.
Configuration changes are activated when a candidate configuration datastore is
committed. d. Uncommitted configuration changes are saved when a user exits the
private configuration edit mode. - ANSWERS-d. Uncommitted configuration changes
are saved when a user exits the private configuration edit mode.
If one user is in the private configuration edit mode and another one is in the read-only
configuration edit mode, which candidate configuration datastore do they have access
to? a. Both users have access to the global configuration datastore. b. Both users have
access to the same private configuration datastore. c. The read-only user has access to
, the global configuration datastore and the private user has access to its own
configuration datastore. d. The read-only user has access to the running configuration
datastore and the private user has access to the global configuration datastore. -
ANSWERS-c. The read-only user has access to the global configuration datastore and
the private user has access to its own configuration datastore.
Which of the following actions exits the MD-CLI implicit configuration mode? a.
Navigating to a CLI context outside the configuration branch b. Navigating to the root
CLI context c. Issuing a full show command d. Issuing the quit-config command -
ANSWERS-b. Navigating to the root CLI context
Which of the following displays the hierarchical structure of the available CLI commands
at the current context level? a. show b. info c. tree d. help - ANSWERS-c. tree
Which of the following is NOT a valid log destination in a Nokia 7750 SR? a. Main b. CLI
c. Syslog d. Console - ANSWERS-a. Main
Which of the following is NOT a characteristic of a hub? a. It can interconnect hosts
located in the same local area network. b. It replicates Ethernet frames across all ports
except the receiving port. c. It inspects layer-2 frame headers. d. Devices connected to
it must operate in half-duplex mode. - ANSWERS-c. It inspects layer-2 frame headers
Which address type is used to send frames to all devices in a Local Area Network? a.
Anycast b. Multicast c. Broadcast d. Unicast - ANSWERS-c. Broadcast
What happens when a switch receives an Ethernet frame with an unknown source MAC
address and a destination MAC address of ff:ff:ff:ff:ff:ff? a. The destination MAC
address is saved in the MAC FDB, and the frame is discarded. b. The destination MAC
address is saved in the MAC FDB, and the frame is flooded to all ports except the
receiving port. c. The source MAC address is saved in the MAC FDB, and the frame is
discarded. d. The source MAC address is saved in the MAC FDB, and the frame is
flooded to all ports except the receiving port. - ANSWERS-d. The source MAC address
is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port
Which of the following statements about VLAN stacking is FALSE? a. It allows a
service provider to support customers that use overlapping VLAN IDs. b. It increases
the number of customers sending VLAN-tagged traffic that a service provider can
support. c. It increases the size of the VLAN ID field in the Ethernet header. d. It allows
a service provider to add another VLAN tag to traffic. - ANSWERS-c. It increases the
size of the VLAN ID field in the Ethernet header
Which of the following statements about LAG is FALSE? a. It aggregates multiple
physical links into a single logical link. b. It improves performance by increasing
bandwidth between devices. c. It provides protection against link or node failure. d. It
supports limited auto-negotiation on member ports. - ANSWERS-c. It provides
protection against link or node failure.