Nokia Network Routing Specialist I (NRS I)
Certification
1. Which TCP/IP layer is responsible for path determination and end-to-end forwarding of datagrams? a. The
Application layer b. The Transport layer c. The Internet layer d. The Link layer: c. The Internet layer
2. What information is part of the encapsulation done at the Link layer? a. Source and destination MAC
addresses b. Source and destination IP address- es c. Source and destination port numbers d. Source and
destination email addresses: a. Source and destination MAC addresses
3. Which of the following is NOT a function of the control plane in a router?
a. To exchange control messages with other routers b. To collaborate with other routers to find the best way to
forward data packets c. To populate the routing table and the tunnel table d. To forward data packets towards the
destination: d. To forward data packets towards their destination
4. Which of the following shows a typical data packet flow when egressing a Nokia 7750 SR? a. SF/CPM ->
MDA -> IOM -> SFP b. SF/CPM -> SFP -> IOM
-> MDA c. SF/CPM -> IOM -> MDA -> SFP d. MDA -> IOM -> SF/CPM -> SFP: c. SF/CPM -> IOM -> MDA -> S
5. Which of the following about MD-CLI is FALSE? a. MD-CLI allows atomic transactions. b. Multiple users
may edit the global candidate configuration concurrently. c. Configuration changes are activated when a
candidate con- figuration datastore is committed. d. Uncommitted configuration changes are saved when a user
exits the private configuration edit mode.: d. Uncommitted configuration changes are saved when a user exits the
private configuration edit mode.
6. If one user is in the private configuration edit mode and another one is in the read-only configuration edit
mode, which candidate configuration datastore do they have access to? a. Both users have access to the global
configuration datastore. b. Both users have access to the same private configuration datas- tore. c. The read-only
user has access to the global configuration datastore and the private user has access to its own configuration
datastore. d. The read-only user has access to the running configuration datastore and the private user has access
to the global configuration datastore.: c. The read-only user has access to the global configuration datastore and the
private user has access to its own configuration datastore.
7. Which of the following actions exits the MD-CLI implicit configuration
mode? a. Navigating to a CLI context outside the configuration branch b. Navigating to the root CLI context c.
Issuing a full show command d. Issuing the quit-config command: b. Navigating to the root CLI context
1/
5
, Nokia Network Routing Specialist I (NRS I)
Certification
8. Which of the following displays the hierarchical structure of the available CLI commands at the current
context level? a. show b. info c. tree d. help: c. tree
9. Which of the following is NOT a valid log destination in a Nokia 7750 SR? a. Main b. CLI c. Syslog d. Console:
a. Main
10.Which of the following is NOT a characteristic of a hub? a. It can intercon- nect hosts located in the same
local area network. b. It replicates Ethernet frames across all ports except the receiving port. c. It inspects layer-2
frame headers. d. Devices connected to it must operate in half-duplex mode.: c. It inspects layer-2 frame headers
11.Which address type is used to send frames to all devices in a Local Area Network? a. Anycast b. Multicast
c. Broadcast d. Unicast: c. Broadcast
12.What happens when a switch receives an Ethernet frame with an unknown source MAC address and a
destination MAC address of ff:ff:ff:ff:ff:ff? a. The destination MAC address is saved in the MAC FDB, and the
frame is discarded.
b. The destination MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the
receiving port. c. The source MAC address is saved in the MAC FDB, and the frame is discarded. d. The source
MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port.: d. The
source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port
13.14. Which of the following statements about VLAN stacking is FALSE? a. It allows a service provider to
support customers that use overlapping VLAN IDs. b. It increases the number of customers sending VLAN-
tagged traffic that a service provider can support. c. It increases the size of the VLAN ID field in the Ethernet
header. d. It allows a service provider to add another VLAN tag to traffic.: c. It increases the size of the VLAN ID
field in the Ethernet header
14. 15. Which of the following statements about LAG is FALSE? a. It aggregates multiple physical links into
a single logical link. b. It improves performance by increasing bandwidth between devices. c. It provides
protection against link or node failure. d. It supports limited auto-negotiation on member ports.: c. It provides
protection against link or node failure.
15.16. Which of the following protocols is used to prevent loops in Ethernet networks? a. LAG b. STP c. ARP
d. ICMP: b. STP
16.17. Which of the following is used to connect multiple broadcast domains?
a. Hub b. Switch c. Router d. Repeater: c. Router
17.18. Which of the following is NOT a Regional Internet Registry? a. ARIN b. IANA c. RIPE NCC d. AfriNIC:
b. IANA
2/
5
Certification
1. Which TCP/IP layer is responsible for path determination and end-to-end forwarding of datagrams? a. The
Application layer b. The Transport layer c. The Internet layer d. The Link layer: c. The Internet layer
2. What information is part of the encapsulation done at the Link layer? a. Source and destination MAC
addresses b. Source and destination IP address- es c. Source and destination port numbers d. Source and
destination email addresses: a. Source and destination MAC addresses
3. Which of the following is NOT a function of the control plane in a router?
a. To exchange control messages with other routers b. To collaborate with other routers to find the best way to
forward data packets c. To populate the routing table and the tunnel table d. To forward data packets towards the
destination: d. To forward data packets towards their destination
4. Which of the following shows a typical data packet flow when egressing a Nokia 7750 SR? a. SF/CPM ->
MDA -> IOM -> SFP b. SF/CPM -> SFP -> IOM
-> MDA c. SF/CPM -> IOM -> MDA -> SFP d. MDA -> IOM -> SF/CPM -> SFP: c. SF/CPM -> IOM -> MDA -> S
5. Which of the following about MD-CLI is FALSE? a. MD-CLI allows atomic transactions. b. Multiple users
may edit the global candidate configuration concurrently. c. Configuration changes are activated when a
candidate con- figuration datastore is committed. d. Uncommitted configuration changes are saved when a user
exits the private configuration edit mode.: d. Uncommitted configuration changes are saved when a user exits the
private configuration edit mode.
6. If one user is in the private configuration edit mode and another one is in the read-only configuration edit
mode, which candidate configuration datastore do they have access to? a. Both users have access to the global
configuration datastore. b. Both users have access to the same private configuration datas- tore. c. The read-only
user has access to the global configuration datastore and the private user has access to its own configuration
datastore. d. The read-only user has access to the running configuration datastore and the private user has access
to the global configuration datastore.: c. The read-only user has access to the global configuration datastore and the
private user has access to its own configuration datastore.
7. Which of the following actions exits the MD-CLI implicit configuration
mode? a. Navigating to a CLI context outside the configuration branch b. Navigating to the root CLI context c.
Issuing a full show command d. Issuing the quit-config command: b. Navigating to the root CLI context
1/
5
, Nokia Network Routing Specialist I (NRS I)
Certification
8. Which of the following displays the hierarchical structure of the available CLI commands at the current
context level? a. show b. info c. tree d. help: c. tree
9. Which of the following is NOT a valid log destination in a Nokia 7750 SR? a. Main b. CLI c. Syslog d. Console:
a. Main
10.Which of the following is NOT a characteristic of a hub? a. It can intercon- nect hosts located in the same
local area network. b. It replicates Ethernet frames across all ports except the receiving port. c. It inspects layer-2
frame headers. d. Devices connected to it must operate in half-duplex mode.: c. It inspects layer-2 frame headers
11.Which address type is used to send frames to all devices in a Local Area Network? a. Anycast b. Multicast
c. Broadcast d. Unicast: c. Broadcast
12.What happens when a switch receives an Ethernet frame with an unknown source MAC address and a
destination MAC address of ff:ff:ff:ff:ff:ff? a. The destination MAC address is saved in the MAC FDB, and the
frame is discarded.
b. The destination MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the
receiving port. c. The source MAC address is saved in the MAC FDB, and the frame is discarded. d. The source
MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port.: d. The
source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port
13.14. Which of the following statements about VLAN stacking is FALSE? a. It allows a service provider to
support customers that use overlapping VLAN IDs. b. It increases the number of customers sending VLAN-
tagged traffic that a service provider can support. c. It increases the size of the VLAN ID field in the Ethernet
header. d. It allows a service provider to add another VLAN tag to traffic.: c. It increases the size of the VLAN ID
field in the Ethernet header
14. 15. Which of the following statements about LAG is FALSE? a. It aggregates multiple physical links into
a single logical link. b. It improves performance by increasing bandwidth between devices. c. It provides
protection against link or node failure. d. It supports limited auto-negotiation on member ports.: c. It provides
protection against link or node failure.
15.16. Which of the following protocols is used to prevent loops in Ethernet networks? a. LAG b. STP c. ARP
d. ICMP: b. STP
16.17. Which of the following is used to connect multiple broadcast domains?
a. Hub b. Switch c. Router d. Repeater: c. Router
17.18. Which of the following is NOT a Regional Internet Registry? a. ARIN b. IANA c. RIPE NCC d. AfriNIC:
b. IANA
2/
5