CISCO
CISCO
Below is the feedback on items for which you did not receive full credit. Some interactive items may not display
your response.
Subscore:
1 Which PDU format is used when bits are received from the netw
Correct Your
Response Resp
When received at the physical layer of a host, the bits are formatted into a frame at the data lin
4.1.2 Communications
Protocols
3 What is the prefix length notation for the subnet mask 255.255.255.224?
Correct Your
Response Resp
The binary format for 255.255.255.224 is 11111111.11111111.11111111.11100000. The prefix length is the num
10.1.1.1
224.6.6.6
172.16.4.4
192.168.5.5
192.167.10.10
172.32.5.2
The private IP addresses are within these three ranges:
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
This item references content from the following areas:
CCNA Cybersecurity Operations
Refer to the exhibit. Using the network in the exhibit, what would be
the default gateway address for host A in the 192.133.219.0
network?
Correct Your
Respons Response
e
192.31.7.1
192.133.219.0
192.133.219.1
192.135.250.1
9
Refer to the exhibit. What is the global IPv6 address of the host in
uncompressed format?
Correct Your
Response Response
2001:0DB8:0000:0000:0000:0BAF:3F57:FE94
2001:0DB8:0000:0000:0BAF:0000:3F57:FE94
2001:0DB8:0000:0BAF:0000:0000:3F57:FE94
2001:DB80:0000:0000:BAF0:0000:3F57:FE94
In the compressed format, the :: represents two contiguous hextets of all zeros. Leading zeros in the
second, fifth, and sixth hextets have also been removed.
4.2.6 IPv6
4.3.1 ICMP
11
The graphic shows a network diagram as follows:
PC A connects to switch S1, which connects to the G0/0 interface of
router R1. PC B connects to switch S2, which connects to the G0/1
interface of router R1. A network analyst is connected to switch S2.
The address of each device is as follows:
PC A: 192.168.1.212 and FE80::1243:FEFE:8A43:2122 and 01-90-
C0-E4-55-BB
PC B: 192.168.2.101 and FE80::FBB2:E77A:D143 and 08-CB-8A-
5C-D5-8A
R1 G0/0:192.168.1.1 and FE80::1 and 00-D0-D3-BE-79-26
R1 G0/1: 192.168.2.1 and FE80::1 and 00-60-0F-B1-D1-11
Refer to the exhibit. A cybersecurity analyst is viewing captured
ICMP echo request packets sent from host A to host B on switch S2.
What is the source MAC address of Ethernet frames carrying the
ICMP echo request packets?
Correct Your
Respon Response
se
01-90-C0-E4-55-BB
00-60-0F-B1-D1-11
08-CB-8A-5C-D5-BA
00-D0-D3-BE-79-26
When router R1 receives the ICMP echo requests from host A it will forward the packets out interface
G0/1 towards host B. However, before forwarding the packets, R1 will encapsulate them in a new
Ethernet frame using the MAC address of interface G0/1 as the source and the MAC address of host B
as the destination.
12
The exhibit shows a network topology. PC1 and PC2 are connected
to the Fa0/1 and Fa0/2 ports of the SW1 switch, respectively. SW1 is
connected through its Fa0/3 port to the Fa0/0 interface of the RT1
router. RT1 is connected through its Fa0/1 to the Fa0/2 port of SW2
switch. SW2 is connected through its Fa0/1 port to the PC3.
Refer to the exhibit. PC1 issues an ARP request because it needs to
send a packet to PC2. In this scenario, what will happen next?
Correct Your
Response Response
SW1 will send an ARP reply with the PC2 MAC address.
SW1 will send an ARP reply with its Fa0/1 MAC address.
RT1 will send an ARP reply with the PC2 MAC address.
RT1 will send an ARP reply with its Fa0/0 MAC address.
When a network device wants to communicate with another device on the same network, it sends a
broadcast ARP request. In this case, the request will contain the IP address of PC2. The destination
device (PC2) sends an ARP reply with its MAC address.
If no device responds to the ARP request, then the originating node will broadcast
the data packet to all devices on the network segment.
When a host is encapsulating a packet into a frame, it refers to the MAC address
table to determine the mapping of IP addresses to MAC addresses.
If a device receiving an ARP request has the destination IPv4 address, it responds
with an ARP reply.
An ARP request is sent to all devices on the Ethernet LAN and contains the IP
address of the destination host and its multicast MAC address.
If a host is ready to send a packet to a local destination device and it has the IP
address but not the MAC address of the destination, it generates an ARP broadcast.
When a node encapsulates a data packet into a frame, it needs the destination MAC address. First it
determines if the destination device is on the local network or on a remote network. Then it checks the
ARP table (not the MAC table) to see if a pair of IP address and MAC address exists for either the
destination IP address (if the destination host is on the local network) or the default gateway IP address
(if the destination host is on a remote network). If the match does not exist, it generates an ARP
broadcast to seek the IP address to MAC address resolution. Because the destination MAC address is
unknown, the ARP request is broadcast with the MAC address FFFF.FFFF.FFFF. Either the destination
device or the default gateway will respond with its MAC address, which enables the sending node to
assemble the frame. If no device responds to the ARP request, then the originating node will discard
the packet because a frame cannot be created.
4.4.2 ARP
14 What are two potential network problems that can result from ARP
operation? (Choose two.)
Correct Your
Response Response
Manually configuring static ARP associations could facilitate ARP poisoning or MAC
address spoofing.
Network attackers could manipulate MAC address and IP address mappings in ARP
messages with the intent of intercepting network traffic.
Multiple ARP replies result in the switch MAC address table containing entries that
match the MAC addresses of hosts that are connected to the relevant switch port.
Large numbers of ARP request broadcasts could cause the host MAC address table
to overflow and prevent the host from communicating on the network.
On large networks with low bandwidth, multiple ARP broadcasts could cause data
communication delays.
Large numbers of ARP broadcast messages could cause momentary data communications delays.
Network attackers could manipulate MAC address and IP address mappings in ARP messages with the
intent to intercept network traffic. ARP requests and replies cause entries to be made into the ARP
table, not the MAC address table. ARP table overflows are very unlikely. Manually configuring static
ARP associations is a way to prevent, not facilitate, ARP poisoning and MAC address spoofing.
Multiple ARP replies resulting in the switch MAC address table containing entries that match the MAC
addresses of connected nodes and are associated with the relevant switch port are required for normal
switch frame forwarding operations. It is not an ARP caused network problem.
16 What is a socket?
Correct Your
Response Response
the combination of the source and destination IP address and source and
destination Ethernet address
the combination of the source and destination sequence numbers and port numbers
A socket is a combination of the source IP address and source port or the destination IP address and
the destination port number.
UDP
· Destination devices will not acknowledge received data
· Headers use very little overhead and cause minimal delay.
This item references content from the following areas:
CCNA Cybersecurity Operations
FCS
sequence numbers
acknowledgments
window size
TCP segments are acknowledged by the receiver as they arrive. The receiver keeps track of the
sequence number of received segments and uses the sequence number to reorder the segments and
to identify any missing segments that need to be retransmitted.
4.6.1 DHCP
4.6.3 NAT
DNS
HTTP
SMTP
DHCP
POP3
The GET command is a client request for data from a web server. A PUT command uploads resources
and content, such as images, to a web server. A POST command uploads data files to a web server.
4.6.6 HTTP
26
Question as presented:
Match the TCP/IP model layer with the function.
application
transport
internet
network access
supports communication between applications
represents data to the user
controls the media
determines best path
Your response:
application
transport
internet
network access
supports communication between applications
transport
represents data to the user
application
controls the media
internet
determines best path
network access
27
Question as presented:
Match the compressed IPv6 address representation with the full IPv6 address. (Not
all options are used.)
2001:DB8:10:11::10
2001:DB8::10:11:101
2001:DB8:10::11:101
2001:DB8::10:0:11:101
2001:0DB8:0010:0000:0000:0000:0011:0101
2001:0DB8:0000:0000:0010:0000:0011:0101
2001:0DB8:0010:0000:0011:0000:0000:0101
2001:0DB8:0010:0011:0000:0000:0000:0010
2001:0DB8:0000:0000:0000:0010:0011:0101
4.2.6 IPv6
Your response:
Match the compressed IPv6 address representation with the full IPv6 address. (Not all options are used.)
2001:DB8:10:11::10
2001:DB8::10:11:101
2001:DB8:10::11:101
2001:DB8::10:0:11:101
2001:0DB8:0010:0000:0000:0000:0011:0101
2001:DB8:10:11::10
2001:0DB8:0000:0000:0010:0000:0011:0101
2001:DB8::10:11:101
2001:0DB8:0010:0000:0011:0000:0000:0101
2001:DB8:10::11:101
2001:0DB8:0010:0011:0000:0000:0000:0010
2001:DB8::10:0:11:101
2001:0DB8:0000:0000:0000:0010:0011:0101
28
Question as presented:
Refer to the exhibit. Consider a datagram that originates on the PC and that is
destined for the web server. Match the IP addresses and port numbers that are in
that datagram to the description. (Not all options are used.)
destination IP address
destination port number
source IP address
source port number
192.168.1.1
192.168.1.2
192.168.2.2
25
2578
80
A TCP/IP segment that originated on the PC has 192.168.1.2 as the IP source address. 2578
is the only possible option for the source port number because the PC port number must be
in the range of registered ports 1024 to 49151. The destination is the web server, which has
the IP address 192.168.2.2, and the destination port number is 80 according to the HTTP
protocol standard.
This item references content from the following areas:
CCNA Cybersecurity Operations
Your response:
Refer to the exhibit. Consider a datagram that originates on the PC and that is destined for the web server. Matc
addresses and port numbers that are in that datagram to the description. (Not all options are used.)
destination IP address
destination port number
source IP address
source port number
192.168.1.1
destination IP address
192.168.1.2
destination port number
192.168.2.2
source port number
25
source IP address
2578
80