Modul 1 Subiecte Cisco (Rezolvate)
Modul 1 Subiecte Cisco (Rezolvate)
Share TweetSharePin it
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the
question to find that question/answer. If the question is not here, find it
in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in
the shortest time. Thank you! We truly value your contribution to the website.
The server establishes the first connection with the client to control traffic that
consists of server commands and client replies.
A large file requires more than two connections between the client and the
server to successfully download it.
The first connection established is for traffic control and the second connection
is created to transfer a file.
Files can be downloaded from or uploaded to the server.
The client needs to run a daemon program to establish an FTP connection
with a server.
Explanation: An FTP client is an application that runs on a computer used to
push and pull files from a server running an FTP daemon. To transfer files, FTP
requires two connections between the client and the server: one for commands
and replies and another for the actual file transfer. The client establishes the first
connection to the server for control traffic and the second connection for the
actual file transfer. This connection is created every time there is a file to be
transferred. The client can download a file from or upload a file to the server.
2. Refer to the exhibit. Consider the IP address configuration shown from PC1.
What is a description of the default gateway address?
CCNA 1 System Test Course (Version 1.1) – System Test Exam PC1
It is the IP address of the Router1 interface that connects the PC1 LAN to
Router1.
It is the IP address of the Router1 interface that connects the company to the
Internet.
It is the IP address of the ISP network device located in the cloud.
It is the IP address of Switch1 that connects PC1 to other devices on the
same LAN.
Explanation: The default gateway is used to route packets destined for remote
networks. The default gateway IP address is the address of the first Layer 3
device (the router interface) that connects to the same network.
3. Open the PT activity. Perform the tasks in the activity instructions and then
answer the question.
What is the application layer service being requested from Server0 by PC0?
CCNA 1 System Test Course (Version 1.1) – System Test Exam PT
In the Simulation mode, capture the packets. What is the application layer service
being requested from Server0 by PC0?
Return to the assessment to answer the question.
FTP
DNS
HTTPS
HTTP
SMTP
Explanation: From the PDU, the destination port is 443, which means the service
requested is HTTPS.
CCNA 1 System Test Course (Version 1.1) – System Test Exam PT Answer
4. Which statement describes the physical topology for a LAN?
It defines how hosts and network devices connect to the LAN.
It shows the order in which hosts access the network.
It depicts the addressing scheme that is employed in the LAN.
It describes whether the LAN is a broadcast or token-passing network.
Explanation: A physical topology defines the way in which computers and other
network devices are connected to a network.
5. Match the term to the value represented.
CCNA 1 System Test Course (Version 1.1) – System Test Exam
Basic Network Connectivity and Communications Exam
1. During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that were visited
by users of the computer. Which type of threat is affecting this computer?
DoS attack
identity theft
spyware
zero-day attack
2. Which term refers to a network that provides secure access to the corporate
offices by suppliers, customers and collaborators?
Internet
intranet
extranet
extendednet
3. A large corporation has modified its network to allow users to access network
resources from their personal laptops and smart phones. Which networking trend
does this describe?
cloud computing
online collaboration
bring your own device
video conferencing
4. What is an ISP?
It is a standards body that develops cabling and wiring standards for
networking.
It is a protocol that establishes how computers within a local network
communicate.
It is an organization that enables individuals and businesses to connect to the
Internet.
It is a networking device that combines the functionality of several different
networking devices in one.
5. Match the requirements of a reliable network with the supporting network
architecture. (Not all options are used.)
SwitchA(config-if)# no shutdown
22. Which two host names follow the guidelines for naming conventions on Cisco
IOS devices? (Choose two.)
Branch2!
RM-3-Switch-2A4
Floor(15)
HO Floor 17
SwBranch799
Explanation: Some guidelines for naming conventions are that names should:
Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters in length
23. How is SSH different from Telnet?
SSH makes connections over the network, whereas Telnet is for out-of-band
access.
SSH provides security to remote sessions by encrypting messages and using user
authentication. Telnet is considered insecure and sends messages in plaintext.
SSH requires the use of the PuTTY terminal emulation program. Tera Term
must be used to connect to devices through the use of Telnet.
SSH must be configured over an active network connection, whereas Telnet
is used to connect to a device from a console connection.
Explanation: SSH is the preferred protocol for connecting to a device operating
system over the network because it is much more secure than Telnet. Both SSH
and Telnet are used to connect to devices over the network, and so are both
used in-band. PuTTY and Terra Term can be used to make both SSH and Telnet
connections.
24. An administrator is configuring a switch console port with a password. In what
order will the administrator travel through the IOS modes of operation in order to
reach the mode in which the configuration commands will be entered? (Not all
options are used.)
CCNA-1-v7-Modules-1-3-Basic Network Connectivity and Communications Exam
Answers 24
Explanation: The configuration mode that the administrator first encounters is
user EXEC mode. After the enable command is entered, the next mode is
privileged EXEC mode. From there, the configure terminal command is entered
to move to global configuration mode. Finally, the administrator enters the line
console 0 command to enter the mode in which the configuration will be entered.
25. What are three characteristics of an SVI? (Choose three.)
It is designed as a security protocol to protect switch ports.
It is not associated with any physical interface on a switch.
It is a special interface that allows connectivity by different types of media.
It is required to allow connectivity by any device at any location.
It provides a means to remotely manage a switch.
It is associated with VLAN1 by default.
Explanation: Switches have one or more switch virtual interfaces (SVIs). SVIs
are created in software since there is no physical hardware associated with them.
Virtual interfaces provide a means to remotely manage a switch over a network
that is using IP. Each switch comes with one SVI appearing in the default
configuration “out-of-the-box.” The default SVI interface is VLAN1.
26. What command is used to verify the condition of the switch interfaces, including
the status of the interfaces and a configured IP address?
ipconfig
ping
traceroute
show ip interface brief
Explanation: The show ip interface brief command is used to display a brief
synopsis of the condition of the device interfaces. The ipconfig command is used
to verify TCP/IP properties on a host. The ping command is used to verify Layer
3 connectivity. The traceroute command is used to trace the network path from
source to destination.
27. Match the description with the associated IOS mode. (Not all options are used.)
28. Match the definitions to their respective CLI hot keys and shortcuts. (Not all
options are used.)
Download
create the signals that represent the bits in each frame on to the media
provide physical addressing to the devices
determine the path packets take through the network
control data access to the media
Explanation: The OSI physical layer provides the means to transport the bits that
make up a frame across the network media. This layer accepts a complete frame
from the data link layer and encodes it as a series of signals that are transmitted
to the local media.
9. With the use of unshielded twisted-pair copper wire in a network, what causes
crosstalk within the cable pairs?
the magnetic field around the adjacent pairs of wire
the use of braided wire to shield the adjacent wire pairs
the reflection of the electrical wave back from the far end of the cable
the collision caused by two nodes trying to use the media simultaneously
Explanation: Crosstalk is a type of noise, or interference that occurs when signal
transmission on one wire interferes with another wire. When current flows
through a wire a magnetic field is produced. The produced magnetic field will
interface the signal carried in the adjacent wire.
10. Refer to the graphic. What type of cabling is shown?
STP
UTP
coax
fiber
Explanation: Network cabling include different types of cables:
UTP cable consists of four pairs of color-coded wires that have been twisted
together and then encased in a flexible plastic sheath.
STP cable uses four pairs of wires, each wrapped in a foil shield, which are
then wrapped in an overall metallic braid or foil.
Coaxial cable uses a copper conductor and a layer of flexible plastic
insulation surrounds the copper conductor.
Fiber cable is a flexible, extremely thin, transparent strand of glass
surrounded by plastic insulation.
11. In addition to the cable length, what two factors could interfere with the
communication carried over UTP cables? (Choose two.)
crosstalk
bandwidth
size of the network
signal modulation technique
electromagnetic interference
Explanation: Copper media is widely used in network communications. However,
copper media is limited by distance and signal interference. Data is transmitted
on copper cables as electrical pulses. The electrical pulses are susceptible to
interference from two sources:
Electromagnetic interference (EMI) or radio frequency interference (RFI) –
EMI and RFI signals can distort and corrupt the data signals being carried by
copper media.
Crosstalk – Crosstalk is a disturbance caused by the electric or magnetic
fields of a signal on one wire interfering with the signal in an adjacent wire.
12. Refer to the graphic. What type of cabling is shown?
STP
UTP
coax
fiber
13. Which two devices commonly affect wireless networks? (Choose two.)
Blu-ray players
home theaters
cordless phones
microwaves
incandescent light bulbs
external hard drives
Explanation: Radio Frequency Interference (RFI) is the interference that is
caused by radio transmitters and other devices that are transmitting in the same
frequency.
14. Which two statements describe the services provided by the data link layer?
(Choose two.)
It defines the end-to-end delivery addressing scheme.
It maintains the path between the source and destination devices during the
data transmission.
It manages the access of frames to the network media.
It provides reliable delivery through link establishment and flow control.
It ensures that application data will be transmitted according to the
prioritization.
It packages various Layer 3 PDUs into a frame format that is compatible with
the network interface.
Explanation: The data link layer is divided into two sub layers, namely Logical
Link Control (LLC) and Media Access Control (MAC). LLC forms a frame from
the network layer PDU into a format that conforms to the requirements of the
network interface and media. A network layer PDU might be for IPv4 or IPv6. The
MAC sub layer defines the media access processes performed by the hardware.
It manages the frame access to the network media according to the physical
signaling requirements (copper cable, fiber optic, wireless, etc.)
15. What is the function of the CRC value that is found in the FCS field of a frame?
to verify the integrity of the received frame
to verify the physical address in the frame
to verify the logical address in the frame
to compute the checksum header for the data field in the frame
Explanation: The CRC value in the FCS field of the received frame is compared
to the computed CRC value of that frame, in order to verify the integrity of the
frame. If the two values do not match, then the frame is discarded.
16. What is contained in the trailer of a data-link frame?
logical address
physical address
data
error detection
Explanation: The trailer in a data-link frame contains error detection information
that is pertinent to the frame included in the FCS field. The header contains
control information, such as the addressing, while the area that is indicated by
the word “data” includes the data, transport layer PDU, and the IP header.
17. Which statement describes a characteristic of the frame header fields of the data
link layer?
They all include the flow control and logical connection fields.
Ethernet frame header fields contain Layer 3 source and destination
addresses.
They vary depending on protocols.
They include information on user applications.
Explanation: All data link layer protocols encapsulate the Layer 3 PDU within the
data field of the frame. However, the structure of the frame and the fields that are
contained in the header vary according to the protocol. Different data link layer
protocols may use different fields, like priority/quality of service, logical
connection control, physical link control, flow control, and congestion control.
18. A network team is comparing physical WAN topologies for connecting remote
sites to a headquarters building. Which topology provides high availability and
connects some, but not all, remote sites?
mesh
partial mesh
hub and spoke
point-to-point
Explanation: Partial mesh topologies provide high availability by interconnecting
multiple remote sites, but do not require a connection between all remote sites. A
mesh topology requires point-to-point links with every system being connected to
every other system. A point-to-point topology is where each device is connected
to one other device. A hub and spoke uses a central device in a star topology
that connects to other point-to-point devices.
19. Which two fields or features does Ethernet examine to determine if a received
frame is passed to the data link layer or discarded by the NIC? (Choose two.)
auto-MDIX
CEF
Frame Check Sequence
minimum frame size
source MAC address
Explanation: An Ethernet frame is not processed and is discarded if it is smaller
than the minimum (64 bytes) or if the calculated frame check sequence (FCS)
value does not match the received FCS value. Auto-MDIX (automatic medium-
dependent interface crossover) is Layer 1 technology that detects cable straight-
through or crossover types. The source MAC address is not used to determine
how the frame is received. CEF (Cisco Express Forwarding) is a technology used
to expedite Layer 3 switching.
20. Which media communication type does not require media arbitration in the data
link layer?
deterministic
half-duplex
full-duplex
controlled access
Explanation: Half-duplex communication occurs when both devices can both
transmit and receive on the medium but cannot do so simultaneously. Full-duplex
communication occurs when both devices can transmit and receive on the
medium at the same time and therefore does not require media arbitration. Half-
duplex communication is typically contention-based, whereas controlled
(deterministic) access is applied in technologies where devices take turns to
access the medium.
21. Which statement describes an extended star topology?
End devices connect to a central intermediate device, which in turn connects to
other central intermediate devices.
End devices are connected together by a bus and each bus connects to a
central intermediate device.
Each end system is connected to its respective neighbor via an intermediate
device.
All end and intermediate devices are connected in a chain to each other.
Explanation: In an extended star topology, central intermediate devices
interconnect other star topologies.
22. What is a characteristic of the LLC sublayer?
It provides the logical addressing required that identifies the device.
It provides delimitation of data according to the physical signaling
requirements of the medium.
It places information in the frame allowing multiple Layer 3 protocols to use the
same network interface and media.
It defines software processes that provide services to the physical layer.
Explanation: The Logical Link Control (LLC) defines the software processes that
provide services to the network layer protocols. The information is placed by LLC
in the frame and identifies which network layer protocol is being used for the
frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6,
to utilize the same network interface and media.
23. What are three ways that media access control is used in networking? (Choose
three.)
Ethernet utilizes CSMA/CD.
Media access control provides placement of data frames onto the media.
Contention-based access is also known as deterministic.
802.11 utilizes CSMA/CD.
Data link layer protocols define the rules for access to different media.
Networks with controlled access have reduced performance due to data
collisions.
Explanation: Wired Ethernet networks use CSMA/CD for media access control.
IEEE 802.11 wireless networks use CSMA/CA, a similar method. Media access
control defines the way data frames get placed on the media. The controlled
access method is deterministic, not a contention-based access to networks.
Because each device has its own time to use the medium, controlled access
networks such as legacy Token Ring do not have collisions.
24. During the encapsulation process, what occurs at the data link layer for a PC
connected to an Ethernet network?
An IP address is added.
The logical address is added.
The physical address is added.
The process port number is added.
Explanation: The Ethernet frame includes the source and destination physical
address. The trailer includes a CRC value in the Frame Check Sequence field to
allow the receiving device to determine if the frame has been changed (has
errors) during the transmission.
25. What three items are contained in an Ethernet header and trailer? (Choose
three.)
source IP address
source MAC address
destination IP address
destination MAC address
error-checking information
Explanation: Layer 2 headers contain the following:
Frame start and stop indicator flags at the beginning and end of a frame
Addressing – for Ethernet networks this part of the header contains source
and destination MAC addresses
Type field to indicate what Layer 3 protocol is being used
Error detection to determine if the frame arrived without error
26. What type of communication rule would best describe CSMA/CD?
access method
flow control
message encapsulation
message encoding
Explanation: Carrier sense multiple access collision detection (CSMA/CD) is the
access method used with Ethernet. The access method rule of communication
dictates how a network device is able to place a signal on the carrier. CSMA/CD
dictates those rules on an Ethernet network and CSMA/CA dictates those rules
on an 802.11 wireless LAN.
27. Which three basic parts are common to all frame types supported by the data
link layer? (Choose three.)
header
type field
MTU size
data
trailer
CRC value
Explanation: The data link protocol is responsible for NIC-to-NIC communications
within the same network. Although there are many different data link layer
protocols that describe data link layer frames, each frame type has three basic
parts:
Header
Data
Trailer
28. Which statement is true about the CSMA/CD access method that is used in
Ethernet?
When a device hears a carrier signal and transmits, a collision cannot occur.
A jamming signal causes only devices that caused the collision to execute a
backoff algorithm.
All network devices must listen before transmitting.
Devices involved in a collision get priority to transmit after the backoff period.
Explanation: Legacy bus-topology Ethernet LAN uses CSMA/CD as network
media access control protocol. It works by detecting a collision in the medium
and backing off (after transmitting a jam signal) as necessary. When one host
wants to transmit a frame, it listens on the medium to check if the medium is
busy. After it senses that no one else is transmitting, the host starts transmitting
the frame, it also monitors the current level to detect a collision. If it detects a
collision, it transmits a special jam signal so that all other hosts can know there
was a collision. The other host will receive this jam signal and stop transmitting.
After this, both hosts enter an exponential backoff phase and retry transmission.
29. What is the auto-MDIX feature on a switch?
the automatic configuration of an interface for 10/100/1000 Mb/s operation
the automatic configuration of an interface for a straight-through or a
crossover Ethernet cable connection
the automatic configuration of full-duplex operation over a single Ethernet
copper or optical cable
the ability to turn a switch interface on or off accordingly if an active
connection is detected
Explanation: The auto-MDIX enables a switch to use a crossover or a straight-
through Ethernet cable to connect to a device regardless of the device on the
other end of the connection.
30. Refer to the exhibit. What is the destination MAC address of the Ethernet frame
as it leaves the web server if the final destination is PC1?
00-60-2F-3A-07-AA
00-60-2F-3A-07-BB
00-60-2F-3A-07-CC
00-60-2F-3A-07-DD
Explanation: The destination MAC address is used for local delivery of Ethernet
frames. The MAC (Layer 2) address changes at each network segment along the
path. As the frame leaves the web server, it will be delivered by using the MAC
address of the default gateway.
31. A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to
a port connected to a 100Base-T network. Which method of memory buffering
would work best for this task?
port-based buffering
level 1 cache buffering
shared memory buffering
fixed configuration buffering
Explanation: With shared memory buffering, the number of frames stored in the
buffer is restricted only by the of the entire memory buffer and not limited to a
single port buffer. This permits larger frames to be transmitted with fewer
dropped frames. This is important to asymmetric switching, which applies to this
scenario, where frames are being exchanged between ports of different rates.
With port-based memory buffering, frames are stored in queues that are linked to
specific incoming and outgoing ports making it possible for a single frame to
delay the transmission of all the frames in memory because of a busy destination
port. Level 1 cache is memory used in a CPU. Fixed configuration refers to the
port arrangement in switch hardware.
32. What are two examples of the cut-through switching method? (Choose
two.)
store-and-forward switching
fast-forward switching
CRC switching
fragment-free switching
QOS switching
Explanation: Store-and forward switching accepts the entire frame and performs
error checking using CRC before forwarding the frame. Store-and-forward is
often required for QOS analysis. Fast-forward and fragment-free are both
variations of the cut-through switching method where only part of the frame is
received before the switch begins to forward it.
33. Which frame forwarding method receives the entire frame and performs
a CRC check to detect errors before forwarding the frame?
cut-through switching
store-and-forward switching
fragment-free switching
fast-forward switching
Explanation: Fast-forward and fragment-free switching are variations of cut-
through switching, which begins to forward the frame before the entire frame is
received.
34. What is the purpose of the FCS field in a frame?
to obtain the MAC address of the sending node
to verify the logical address of the sending node
to compute the CRC header for the data field
to determine if errors occurred in the transmission and reception
Explanation: The FCS field in a frame is used to detect any errors in the
transmission and receipt of a frame. This is done by comparing the CRC value
within the frame against a computed CRC value of the frame. If the two values do
not match, then the frame is discarded.
35. Which switching method has the lowest level of latency?
cut-through
store-and-forward
fragment-free
fast-forward
Explanation: Fast-forward switching begins to forward a frame after reading the
destination MAC address, resulting in the lowest latency. Fragment-free reads
the first 64 bytes before forwarding. Store-and-forward has the highest latency
because it reads the entire frame before beginning to forward it. Both fragment-
free and fast-forward are types of cut-through switching.
36. A network administrator is connecting two modern switches using a straight-
through cable. The switches are new and have never been configured. Which three
statements are correct about the final result of the connection? (Choose three.)
The link between the switches will work at the fastest speed that is supported by
both switches.
The link between switches will work as full-duplex.
If both switches support different speeds, they will each work at their own
fastest speed.
The auto-MDIX feature will configure the interfaces eliminating the need for a
crossover cable.
The connection will not be possible unless the administrator changes the
cable to a crossover cable.
The duplex capability has to be manually configured because it cannot be
negotiated.
Explanation: Modern switches can negotiate to work in full-duplex mode if both
switches are capable. They will negotiate to work using the fastest possible
speed and the auto-MDIX feature is enabled by default, so a cable change is not
needed.
37. Which advantage does the store-and-forward switching method have compared
with the cut-through switching method?
collision detecting
frame error checking
faster frame forwarding
frame forwarding using IPv4 Layer 3 and 4 information
Explanation: A switch using the store-and-forward switching method performs an
error check on an incoming frame by comparing the FCS value against its own
FCS calculations after the entire frame is received. In comparison, a switch using
the cut-through switching method makes quick forwarding decisions and starts
the forwarding process without waiting for the entire frame to be received. Thus a
switch using cut-through switching may send invalid frames to the network. The
performance of store-and-forward switching is slower compared to cut-through
switching performance. Collision detection is monitored by the sending device.
Store-and-forward switching does not use IPv4 Layer 3 and 4 information for its
forwarding decisions.
38. When the store-and-forward method of switching is in use, what part of the
Ethernet frame is used to perform an error check?
CRC in the trailer
source MAC address in the header
destination MAC address in the header
protocol type in the header
Explanation: The cyclic redundancy check (CRC) part of the trailer is used to
determine if the frame has been modified during transit. If the integrity of the
frame is verified, the frame is forwarded. If the integrity of the frame cannot be
verified, then the frame is dropped.
cut-through
fast-forward
fragment-free
store-and-forward
Explanation: When the store-and-forward switching method is used, the switch
receives the complete frame before forwarding it on to the destination. The cyclic
redundancy check (CRC) part of the trailer is used to determine if the frame has
been modified during transit. In contrast, a cut-through switch forwards the frame
once the destination Layer 2 address is read. Two types of cut-through switching
methods are fast-forward and fragment-free.
40. What are two actions performed by a Cisco switch? (Choose two.)
building a routing table that is based on the first IP address in the frame
header
using the source MAC addresses of frames to build and maintain a MAC
address table
forwarding frames with unknown destination IP addresses to the default
gateway
utilizing the MAC address table to forward frames via the destination MAC
address
examining the destination MAC address to add new entries to the MAC
address table
Explanation: Important actions that a switch performs are as follows:
When a frame comes in, the switch examines the Layer 2 source address to
build and maintain the Layer 2 MAC address table.
It examines the Layer 2 destination address to determine how to forward the
frame. When the destination address is in the MAC address table, then the
frame is sent out a particular port. When the address is unknown, the frame
is sent to all ports that have devices connected to that network.
41. Which two statements describe features or functions of the logical link control
sublayer in Ethernet standards? (Choose two.)
Logical link control is implemented in software.
Logical link control is specified in the IEEE 802.3 standard.
The LLC sublayer adds a header and a trailer to the data.
The data link layer uses LLC to communicate with the upper layers of the
protocol suite.
The LLC sublayer is responsible for the placement and retrieval of frames on
and off the media.
Explanation: Logical link control is implemented in software and enables the data
link layer to communicate with the upper layers of the protocol suite. Logical link
control is specified in the IEEE 802.2 standard. IEEE 802.3 is a suite of
standards that define the different Ethernet types. The MAC (Media Access
Control) sublayer is responsible for the placement and retrieval of frames on and
off the media. The MAC sublayer is also responsible for adding a header and a
trailer to the network layer protocol data unit (PDU).
42. What is the auto-MDIX feature?
It enables a device to automatically configure an interface to use a straight-
through or a crossover cable.
It enables a device to automatically configure the duplex settings of a
segment.
It enables a device to automatically configure the speed of its interface.
It enables a switch to dynamically select the forwarding method.
Explanation: The auto-MDIX feature allows the device to configure its network
port according to the cable type that is used (straight-through or crossover) and
the type of device that is connected to that port. When a port of a switch is
configured with auto-MDIX, this switch can be connected to another switch by the
use of either a straight-through cable or a crossover cable.
Download
Which port does Switch0 use to send frames to the host with the IPv4
address 10.1.1.5?
Fa0/1
Fa0/5
Fa0/9
Fa0/11
Explanation: Issuing the command ipconfig /all from the PC0 command prompt
displays the IPv4 address and MAC address. When the IPv4 address 10.1.1.5 is
pinged from PC0, the switch stores the source MAC address (from PC0) along
with the port to which PC0 is connected. When the destination reply is received,
the switch takes the destination MAC address and compares to MAC addresses
stored in the MAC address table. Issuing the show mac-address-table on the PC0
Terminal application displays two dynamic MAC address entries. The MAC
address and port entry that does not belong to PC0 must be the MAC address
and port of the destination with the IPv4 address 10.1.1.5.
48. What does the term “attenuation” mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
Explanation: Data is transmitted on copper cables as electrical pulses. A detector
in the network interface of a destination device must receive a signal that can be
successfully decoded to match the signal sent. However, the farther the signal
travels, the more it deteriorates. This is referred to as signal attenuation.
49. What makes fiber preferable to copper cabling for interconnecting buildings?
(Choose three.)
greater distances per cable run
lower installation cost
limited susceptibility to EMI/RFI
durable connections
greater bandwidth potential
easily terminated
Explanation: Optical fiber cable transmits data over longer distances and at
higher bandwidths than any other networking media. Unlike copper wires, fiber-
optic cable can transmit signals with less attenuation and is completely immune
to EMI and RFI.
50. What OSI physical layer term describes the process by which one wave modifies
another wave?
modulation
IEEE
EIA/TIA
air
51. What OSI physical layer term describes the capacity at which a medium can
carry data?
bandwidth
IEEE
EIA/TIA
air
53. What OSI physical layer term describes the measure of the transfer of bits
across a medium over a given period of time?
throughput
bandwidth
latency
goodput
54. What OSI physical layer term describes the amount of time, including delays,
for data to travel from one point to another?
latency
bandwidth
throughput
goodput
55. What OSI physical layer term describes the amount of time, including delays,
for data to travel from one point to another?
latency
fiber-optic cable
air
copper cable
56. What OSI physical layer term describes the measure of usable data transferred
over a given period of time?
goodput
fiber-optic cable
air
copper cable
57. What OSI physical layer term describes the physical medium which uses
electrical pulses?
copper cable
fiber-optic cable
air
goodput
58. What OSI physical layer term describes the physical medium that uses the
propagation of light?
fiber-optic cable
goodput
latency
throughput
59. What OSI physical layer term describes the physical medium for microwave
transmissions?
air
goodput
latency
throughput
60. Which two functions are performed at the MAC sublayer of the OSI data link
layer? (Choose two.)
Adds Layer 2 control information to network protocol data.
Places information in the frame that identifies which network layer protocol is
being used for the frame.
Controls the NIC responsible for sending and receiving data on the physical
medium.
Implements a trailer to detect transmission errors.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Case 2:
Provides synchronization between source and target nodes.
Integrates various physical technologies.
Communicates between the networking software at the upper layers and the
device hardware at the lower layers.
Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Case 3:
Enables IPv4 and IPv6 to utilize the same network interface and media.
Provides synchronization between source and target nodes.
Implements a trailer to detect transmission errors.
Adds Layer 2 control information to network protocol data.
Places information in the frame that identifies which network layer protocol is
being used for the frame.
Case 4:
Enables IPv4 and IPv6 to utilize the same network interface and media.
Adds Layer 2 control information to network protocol data.
Integrates various physical technologies.
Communicates between the networking software at the upper layers and the
device hardware at the lower layers.
Provides synchronization between source and target nodes.
Case 5:
Places information in the frame that identifies which network layer protocol is
being used for the frame.
Integrates various physical technologies.
Adds Layer 2 control information to network protocol data.
Controls the NIC responsible for sending and receiving data on the physical
medium.
Communicates between the networking software at the upper layers and the
device hardware at the lower layers.
Case 6:
Controls the NIC responsible for sending and receiving data on the physical
medium
Provides a mechanism to allow multiple devices to communicate over a shared
medium.
61. Which two functions are performed at the LLC sublayer of the OSI data link
layer? (Choose two.)
Enables IPv4 and IPv6 to utilize the same network interface and media.
Places information in the frame that identifies which network layer protocol is
being used for the frame.
Integrates various physical technologies.
Implements a process to delimit fields within a Layer 2 frame.
Controls the NIC responsible for sending and receiving data on the physical
medium.
64. Which two functions are performed at the LLC sublayer of the OSI data link
layer? (Choose two.)
Adds Layer 2 control information to network protocol data.
Places information in the frame that identifies which network layer protocol is
being used for the frame.
Performs data encapsulation.
Controls the NIC responsible for sending and receiving data on the physical
medium.
Integrates various physical technologies.
66. Which two functions are performed at the LLC sublayer of the OSI data link
layer? (Choose two.)
Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Provides data link layer addressing.
Implements a trailer to detect transmission errors.
Provides synchronization between source and target nodes.
68. Which two functions are performed at the LLC sublayer of the OSI data link
layer? (Choose two.)
Enables IPv4 and IPv6 to utilize the same network interface and media.
Adds Layer 2 control information to network protocol data.
Integrates various physical technologies.
Implements a trailer to detect transmission errors.
Provides synchronization between source and target nodes.
71. What action will occur if a switch receives a frame with the destination MAC
address FF:FF:FF:FF:FF:FF?
The switch forwards it out all ports except the ingress port.
The switch shares the MAC address table entry with any connected
switches.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination
MAC address is not local.
73. What action will occur if a switch receives a frame with the destination MAC
address 01:00:5E:00:00:D9?
The switch forwards it out all ports except the ingress port.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination
MAC address is not local.
The switch shares the MAC address table entry with any connected
switches.
74. What action will occur if a host receives a frame with a destination MAC
address of FF:FF:FF:FF:FF:FF?
The host will process the frame.
The host forwards the frame to the router.
The host sends the frame to the switch to update the MAC address table.
The host forwards the frame to all other hosts.
75. What action will occur if a switch receives a frame and does have the source
MAC address in the MAC table?
The switch refreshes the timer on that entry.
The switch adds it to its MAC address table associated with the port number.
The switch forwards the frame to the associated port.
The switch sends the frame to a connected router because the destination
MAC address is not local.
76. What action will occur if a host receives a frame with a destination MAC
address of FF:FF:FF:FF:FF:FF?
The host will process the frame.
The host returns the frame to the switch.
The host replies to the switch with its own IP address.
The host forwards the frame to all other hosts.
78. What action will occur if a host receives a frame with a destination MAC
address it does not recognize?
The host will discard the frame.
The host replies to the switch with its own IP address.
The host forwards the frame to all other hosts.
The host returns the frame to the switch.
79. Which type of UTP cable is used to connect a PC to a switch port?
console
rollover
crossover
straight-through
Explanation: A rollover cable is a Cisco proprietary cable used to connect to a
router or switch console port. A straight-through (also called patch) cable is
usually used to interconnect a host to a switch and a switch to a router. A
crossover cable is used to interconnect similar devices together, for example,
between two switches, two routers, and two hosts.
Explanation: There are three major phases to the bootup process of a Cisco
router:
1. Perform the POST and load the bootstrap program.
2. Locate and load the Cisco IOS software.
3. Locate and load the startup configuration file
If a startup configuration file cannot be located, the router will enter setup mode
by displaying the setup mode prompt.
35. Match the command with the device mode at which the command is entered.
(Not all options are used.)
Explanation: The enable command is entered in R1> mode. The login command
is entered in R1(config-line)# mode. The copy running-config startup-
config command is entered in R1# mode. The ip address 192.168.4.4
255.255.255.0 command is entered in R1(config-if)# mode. The service password-
encryption command is entered in global configuration mode.
36. What are two functions of NVRAM? (Choose two.)
to store the routing table
to retain contents when power is removed
to store the startup configuration file
to contain the running configuration file
to store the ARP table
Explanation: NVRAM is permanent memory storage, so the startup configuration
file is preserved even if the router loses power.
37. A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
The configuration file is missing from NVRAM.
The POST process has detected hardware failure.
Explanation: If a router cannot locate the startup-config file in NVRAM, it will
enter setup mode to allow the configuration to be entered from the console
device.
38. The global configuration command ip default-gateway 172.16.100.1 is applied to
a switch. What is the effect of this command?
The switch will have a management interface with the address 172.16.100.1.
The switch can be remotely managed from a host on another network.
The switch can communicate with other hosts on the 172.16.100.0 network.
The switch is limited to sending and receiving frames to and from the
gateway 172.16.100.1.
Explanation: A default gateway address is typically configured on all devices to
allow them to communicate beyond just their local network.In a switch this is
achieved using the command ip default-gateway <ip address>.
39. What happens when the transport input ssh command is entered on the switch
vty lines?
The SSH client on the switch is enabled.
Communication between the switch and remote users is encrypted.
The switch requires a username/password combination for remote access.
The switch requires remote connections via a proprietary client software.
Explanation: The transport input ssh command when entered on the switch vty
(virtual terminal lines) will encrypt all inbound controlled telnet connections.
40. Refer to the exhibit. A user PC has successfully transmitted packets to
www.cisco.com. Which IP address does the user PC target in order to forward its
data off the local network?
172.24.255.17
172.24.1.22
172.20.0.254
172.24.255.4
172.20.1.18
41. Match the configuration mode with the command that is available in that mode.
(Not all options are used.)
Explanation: The enable command is entered at the R1> prompt.
The login command is entered at the R1(config-line)# prompt. The copy running-
config startup-config command is entered at the R1# prompt. The interface
fastethernet 0/0 command is entered at the R1(config)# prompt.
42. Which three commands are used to set up secure access to a router through a
connection to the console interface? (Choose three.)
interface fastethernet 0/0
line vty 0 4
line console 0
enable secret cisco
login
password cisco
Explanation: The three commands needed to password protect the console port
are as follows:
line console 0
password cisco
login
The interface fastethernet 0/0 command is commonly used to access the
configuration mode used to apply specific parameters such as the IP address to
the Fa0/0 port. The line vty 0 4 command is used to access the configuration
mode for Telnet. The0and 4 parameters specify ports 0 through 4, or a maximum
of five simultaneous Telnet connections. The enable secret command is used to
apply a password used on the router to access the privileged mode.
43. Refer to the exhibit. Consider the IP address configuration shown from PC1.
What is a description of the default gateway address?
It is the IP address of the Router1 interface that connects the company to the
Internet.
It is the IP address of the Router1 interface that connects the PC1 LAN to
Router1.
It is the IP address of Switch1 that connects PC1 to other devices on the
same LAN.
It is the IP address of the ISP network device located in the cloud.
Explanation: The default gateway is used to route packets destined for remote
networks. The default gateway IP address is the address of the first Layer 3
device (the router interface) that connects to the same network.
44. Which two functions are primary functions of a router? (Choose two.)
packet forwarding
microsegmentation
domain name resolution
path selection
flow control
Explanation: A router accepts a packet and accesses its routing table to
determine the appropriate exit interface based on the destination address. The
router then forwards the packet out of that interface.
45. What is the effect of using the Router# copy running-config startup-config
command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
Explanation: The command copy running-config startup-config copies the
running-configuration file from RAM into NVRAM and saves it as the startup-
configuration file. Since NVRAM is none-volatile memory it will be able to retain
the configuration details when the router is powered off.
46. What will happen if the default gateway address is incorrectly configured on a
host?
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default
gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.
Explanation: When a host needs to send a message to another host located on
the same network, it can forward the message directly. However, when a host
needs to send a message to a remote network, it must use the router, also
known as the default gateway. This is because the data link frame address of the
remote destination host cannot be used directly. Instead, the IP packet has to be
sent to the router (default gateway) and the router will forward the packet toward
its destination. Therefore, if the default gateway is incorrectly configured, the host
can communicate with other hosts on the same network, but not with hosts on
remote networks.
47. What are two potential network problems that can result from ARP operation?
(Choose two.)
Manually configuring static ARP associations could facilitate ARP poisoning
or MAC address spoofing.
On large networks with low bandwidth, multiple ARP broadcasts could cause
data communication delays.
Network attackers could manipulate MAC address and IP address mappings in
ARP messages with the intent of intercepting network traffic.
Large numbers of ARP request broadcasts could cause the host MAC
address table to overflow and prevent the host from communicating on the
network.
Multiple ARP replies result in the switch MAC address table containing
entries that match the MAC addresses of hosts that are connected to the
relevant switch port.
Explanation: Large numbers of ARP broadcast messages could cause
momentary data communications delays. Network attackers could manipulate
MAC address and IP address mappings in ARP messages with the intent to
intercept network traffic. ARP requests and replies cause entries to be made into
the ARP table, not the MAC address table. ARP table overflows are very unlikely.
Manually configuring static ARP associations is a way to prevent, not facilitate,
ARP poisoning and MAC address spoofing. Multiple ARP replies resulting in the
switch MAC address table containing entries that match the MAC addresses of
connected nodes and are associated with the relevant switch port are required
for normal switch frame forwarding operations. It is not an ARP caused network
problem.
48. Open the PT activity. Perform the tasks in the activity instructions and then
answer the question.
Download
RTR1(config-if)# no shutdown
RTR1(config-if)# no shutdown
RTR1(config-if)# no shutdown
RTR1(config-if)# no shutdown
RTR1(config-if)# end
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# end
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# end
Refer to the exhibit. A network administrator is connecting a new host to the
Service LAN. The host needs to communicate with remote networks. What IP
address would be configured as the default gateway on the new host?
172.29.157.156
172.29.157.1
10.156.157.254
198.51.100.177
172.29.156.36
70.
BldgA(config)# interface gi0/1
BldgA(config-if)# no shutdown
BldgA(config-if)# no shutdown
BldgA(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# end
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# end
HQ(config-if)# no shutdown
HQ(config-if)# no shutdown
HQ(config-if)# no shutdown
HQ(config-if)# no shutdown
HQ(config-if)# end
Refer to the exhibit. A network administrator is connecting a new host to the Store
LAN. The host needs to communicate with remote networks. What IP address
would be configured as the default gateway on the new host?
172.19.98.230
172.19.98.1
10.98.99.254
209.165.200.120
172.19.99.99
74.
HQ(config)# interface gi0/1
HQ(config-if)# no shutdown
HQ(config-if)# no shutdown
HQ(config-if)# no shutdown
HQ(config-if)# no shutdown
HQ(config-if)# end
Refer to the exhibit. A network administrator is connecting a new host to the Store
LAN. The host needs to communicate with remote networks. What IP address
would be configured as the default gateway on the new host?
172.20.132.13
172.20.132.1
10.132.133.254
198.51.100.156
172.20.133.132
75.
Main(config)# interface gi0/1
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# end
BldgA(config-if)# no shutdown
BldgA(config-if)# interface gi0/0
BldgA(config-if)# no shutdown
BldgA(config-if)# no shutdown
11. What three blocks of addresses are defined by RFC 1918 for private network
use? (Choose three.)
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
100.64.0.0/14
169.254.0.0/16
239.0.0.0/8
Explanation: RFC 1918, Address Allocation for Private Internets, defines three
blocks of IPv4 address for private networks that should not be routable on the
public Internet.
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
12. Refer to the exhibit. An administrator must send a message to everyone on the
router A network. What is the broadcast address for network 172.16.16.0/22?
172.16.16.255
172.16.20.255
172.16.19.255
172.16.23.255
172.16.255.255
Explanation: The 172.16.16.0/22 network has 22 bits in the network portion and
10 bits in the host portion. Converting the network address to binary yields a
subnet mask of 255.255.252.0. The range of addresses in this network will end
with the last address available before 172.16.20.0. Valid host addresses for this
network range from 172.16.16.1-172.16.19.254, making 172.16.19.255 the
broadcast address.
13. A site administrator has been told that a particular network at the site must
accommodate 126 hosts. Which subnet mask would be used that contains the
required number of host bits?
255.255.255.0
255.255.255.128
255.255.255.224
255.255.255.240
Explanation: The subnet mask of 255.255.255.0 has 8 host bits. The mask of
255.255.255.128 results in 7 host bits. The mask of 255.255.255.224 has 5 host
bits. Finally, 255.255.255.240 represents 4 host bits.
14. Refer to the exhibit. Considering the addresses already used and having to
remain within the 10.16.10.0/24 network range, which subnet address could be
assigned to the network containing 25 hosts?
10.16.10.160/26
10.16.10.128/28
10.16.10.64/27
10.16.10.224/26
10.16.10.240/27
10.16.10.240/28
Explanation: Addresses 10.16.10.0 through 10.16.10.63 are taken for the
leftmost network. Addresses 10.16.10.192 through 10.16.10.207 are used by the
center network.The address space from 208-255 assumes a /28 mask, which
does not allow enough host bits to accommodate 25 host addresses.The address
ranges that are available include 10.16.10.64/26 and10.16.10.128/26. To
accommodate 25 hosts, 5 host bits are needed, so a /27 mask is necessary.
Four possible /27 subnets could be created from the available addresses
between 10.16.10.64 and 10.16.10.191:
10.16.10.64/27
10.16.10.96/27
10.16.10.128/27
10.16.10.160/27
15. What is the usable number of host IP addresses on a network that has a /26
mask?
256
254
64
62
32
16
Explanation: A /26 mask is the same as 255.255.255.192. The mask leaves 6
host bits. With 6 host bits, 64 IP addresses are possible. One address represents
the subnet number and one address represents the broadcast address, which
means that 62 addresses can then be used to assign to network devices.
16. Which address prefix range is reserved for IPv4 multicast?
240.0.0.0 – 254.255.255.255
224.0.0.0 – 239.255.255.255
169.254.0.0 – 169.254.255.255
127.0.0.0 – 127.255.255.255
Explanation: Multicast IPv4 addresses use the reserved class D address range
of 224.0.0.0 to 239.255.255.255.
17. Refer to the exhibit. Match the network with the correct IP address and prefix
that will satisfy the usable host addressing requirements for each network.
Explanation: Network A needs to use 192.168.0.128 /25, which yields 128 host
addresses.
Network B needs to use 192.168.0.0 /26, which yields 64 host addresses.
Network C needs to use 192.168.0.96 /27, which yields 32 host addresses.
Network D needs to use 192.168.0.80/30, which yields 4 host addresses.
18. A high school in New York (school A) is using videoconferencing technology to
establish student interactions with another high school (school B) in Russia. The
videoconferencing is conducted between two end devices through the Internet. The
network administrator of school A configures the end device with the IP address
209.165.201.10. The administrator sends a request for the IP address for the end
device in school B and the response is 192.168.25.10. Neither school is using a VPN.
The administrator knows immediately that this IP will not work. Why?
This is a loopback address.
This is a link-local address.
This is a private IP address.
There is an IP address conflict.
19. Which three addresses are valid public addresses? (Choose three.)
198.133.219.17
192.168.1.245
10.15.250.5
128.107.12.117
172.31.1.25
64.104.78.227
Explanation: The ranges of private IPv4 addresses are as folllows:
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
20. A message is sent to all hosts on a remote network. Which type of message is it?
limited broadcast
multicast
directed broadcast
unicast
Explanation: A directed broadcast is a message sent to all hosts on a specific
network. It is useful for sending a broadcast to all hosts on a nonlocal network. A
multicast message is a message sent to a selected group of hosts that are part of
a subscribing multicast group. A limited broadcast is used for a communication
that is limited to the hosts on the local network. A unicast message is a message
sent from one host to another.
21. A company has a network address of 192.168.1.64 with a subnet mask of
255.255.255.192. The company wants to create two subnetworks that would contain
10 hosts and 18 hosts respectively. Which two networks would achieve that?
(Choose two.)
192.168.1.16/28
192.168.1.64/27
192.168.1.128/27
192.168.1.96/28
192.168.1.192/28
Explanation: Subnet 192.168.1.64 /27 has 5 bits that are allocated for host
addresses and therefore will be able to support 32 addresses, but only 30 valid
host IP addresses. Subnet 192.168.1.96/28 has 4 bits for host addresses and will
be able to support 16 addresses, but only 14 valid host IP addresses.
22. Which address is a valid IPv6 link-local unicast address?
FEC8:1::FFFF
FD80::1:1234
FE80::1:4545:6578:ABC1
FE0A::100:7788:998F
FC90:5678:4251:FFFF
Explanation: IPv6 LLAs are in the fe80::/10 range. The /10 indicates that the first
10 bits are 1111 1110 10xx xxxx. The first hextet has a range of 1111 1110 1000
0000 (fe80) to 1111 1110 1011 1111 (febf).
23. Which of these addresses is the shortest abbreviation for the IP address:
3FFE:1044:0000:0000:00AB:0000:0000:0057?
3FFE:1044::AB::57
3FFE:1044::00AB::0057
3FFE:1044:0:0:AB::57
3FFE:1044:0:0:00AB::0057
3FFE:1044:0000:0000:00AB::57
3FFE:1044:0000:0000:00AB::0057
Explanation: The rules for reducing the notation of IPv6 addresses are:
1. Omit any leading 0s (zeros) in any hextet.
2. Replace any single, contiguous string of one or more 16-bit hextets consisting
of all zeros with a double colon (::) .
3. The double colon (::) can only be used once within an address.
24. A network administrator has received the IPv6 prefix 2001:DB8::/48 for
subnetting. Assuming the administrator does not subnet into the interface ID
portion of the address space, how many subnets can the administrator create from
the /48 prefix?
16
256
4096
65536
Explanation: With a network prefix of 48, there will be 16 bits available for
subnetting because the interface ID starts at bit 64. Sixteen bits will yield 65536
subnets.
25. Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is
created if the subnet prefix is changed to /52?
2001:db8:0:f00::/52
2001:db8:0:8000::/52
2001:db8:0:f::/52
2001:db8:0:f000::/52
Explanation: Prefix 2001:db8::/48 has 48 network bits. If we subnet to a /52, we
are moving the network boundary four bits to the right and creating 16 subnets.
The first subnet is 2001:db8::/52 the last subnet is 2001:db8:0:f000::/52.
26. Consider the following range of addresses:
2001:0DB8:BC15:00A0:0000::
2001:0DB8:BC15:00A1:0000::
2001:0DB8:BC15:00A2:0000::
…
2001:0DB8:BC15:00AF:0000::
The prefix-length for the range of addresses is /60 .
Explanation: All the addresses have the part 2001:0DB8:BC15:00A in common.
Each number or letter in the address represents 4 bits, so the prefix-length is /60.
27. What type of IPv6 address is FE80::1?
loopback
link-local
multicast
global unicast
Explanation: Link-local IPv6 addresses start with FE80::/10, which is any address
from FE80:: to FEBF::. Link-local addresses are used extensively in IPv6 and
allow directly connected devices to communicate with each other on the link they
share.
28. Refer to the exhibit. A company is deploying an IPv6 addressing scheme for its
network. The company design document indicates that the subnet portion of the
IPv6 addresses is used for the new hierarchical network design, with the site
subsection to represent multiple geographical sites of the company, the sub-site
section to represent multiple campuses at each site, and the subnet section to
indicate each network segment separated by routers. With such a scheme, what is
the maximum number of subnets achieved per sub-site?
Refer to the exhibit. A company is deploying an IPv6 addressing scheme for its
network. The company design document indicates that the subnet portion of the
IPv6 addresses is used for the new hierarchical network design, with the s ite
subsection to represent multiple geographical sites of the company, the s ub-site
section to represent multiple campuses at each site, and the s ubnet section to
indicate each network segment separated by routers. With such a scheme, what is
the maximum number of subnets achieved per sub-site ?
0
4
16
256
Explanation: Because only one hexadecimal character is used to represent the
subnet, that one character can represent 16 different values 0 through F.
29. What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6
enabled interface?
the MAC address of the IPv6 enabled interface
a randomly generated 64-bit hexadecimal address
an IPv6 address that is provided by a DHCPv6 server
an IPv4 address that is configured on the interface
Explanation: The EUI-64 process uses the MAC address of an interface to
construct an interface ID (IID). Because the MAC address is only 48 bits in
length, 16 additional bits (FF:FE) must be added to the MAC address to create
the full 64-bit interface ID.
30. What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?
2001:DB8:BC15
2001:DB8:BC15:A
2001:DB8:BC15:A:1
2001:DB8:BC15:A:12
Explanation: The network portion, or prefix, of an IPv6 address is identified
through the prefix length. A /64 prefix length indicates that the first 64 bits of the
IPv6 address is the network portion. Hence the prefix is 2001:DB8:BC15:A.
31. An IPv6 enabled device sends a data packet with the destination address of
FF02::1. What is the target of this packet?
the one IPv6 device on the link that has been uniquely configured with this
address
all IPv6 enabled devices on the local link or network
only IPv6 DHCP servers
only IPv6 configured routers
Explanation: This address is one of the assigned IPv6 multicast addresses.
Packets addressed to FF02::1 are for all IPv6 enabled devices on the link or
network. FF02::2 is for all IPv6 routers that exist on the network.
32. Match the IPv6 address with the IPv6 address type. (Not all options are used.)
PC2
R1
SW2
R2
SW1
41. Which protocol is used by the traceroute command to send and receive echo-
requests and echo-replies?
SNMP
ICMP
Telnet
TCP
Explanation: Traceroute uses the ICMP (Internet Control Message Protocol) to
send and receive echo-request and echo-reply messages.
42. Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is
decremented to zero and the packet cannot be forwarded?
network unreachable
time exceeded
protocol unreachable
port unreachable
Explanation: ICMPv6 uses the hop limit field in the IPv6 packet header to
determine if the packet has expired. If the hop limit field has reached zero, a
router will send a time exceeded message back towards the source indicating
that the router cannot forward the packet.
43. A user executes a traceroute over IPv6. At what point would a router in the path
to the destination device drop the packet?
when the value of the Hop Limit field reaches 255
when the value of the Hop Limit field reaches zero
when the router receives an ICMP time exceeded message
when the target host responds with an ICMP echo reply message
Explanation: When a traceroute is performed, the value in the Hop Limit field of
an IPv6 packet determines how many router hops the packet can travel. Once
the Hop Limit field reaches a value of zero, it can no longer be forwarded and the
receiving router will drop the packet.
44. What is the purpose of ICMP messages?
to inform routers about network topology changes
to ensure the delivery of an IP packet
to provide feedback of IP packet transmissions
to monitor the process of a domain name to IP address resolution
Explanation: The purpose of ICMP messages is to provide feedback about
issues that are related to the processing of IP packets.
45. What source IP address does a router use by default when the traceroute
command is issued?
the highest configured IP address on the router
a loopback IP address
the IP address of the outbound interface
the lowest configured IP address on the router
Explanation: When sending an echo request message, a router will use the IP
address of the exit interface as the source IP address. This default behavior can
be changed by using an extended ping and specifying a specific source IP
address.
46. Match each description with an appropriate IP address. (Not all options are
used.)
11. What important information is added to the TCP/IP transport layer header to ensure
communication and connectivity with a remote network device?
timing and synchronization
destination and source port numbers
destination and source physical addresses
destination and source logical network addresses
12. Which two characteristics are associated with UDP sessions? (Choose two.)
Destination devices receive traffic with minimal delay.
Transmitted data segments are tracked.
Destination devices reassemble messages and pass them to an application.
Received data is unacknowledged.
Unacknowledged data packets are retransmitted.
Explanation:
TCP:
Provides tracking of transmitted data segments
Destination devices will acknowledge received data.
Source devices will retransmit unacknowledged data.
UDP
Destination devices will not acknowledge received data
Headers use very little overhead and cause minimal delay.
13. A client application needs to terminate a TCP communication session with a server.
Place the termination process steps in the order that they will occur. (Not all options are
used.)
Explanation: In order to terminate a TCP session, the client sends to the server a segment with
the FIN flag set. The server acknowledges the client by sending a segment with the ACK flag
set. The server sends a FIN to the client to terminate the server to client session. The client
acknowledges the termination by sending a segment with the ACK flag set.
14. Which flag in the TCP header is used in response to a received FIN in order to terminate
connectivity between two network devices?
FIN
ACK
SYN
RST
Explanation: In a TCP session, when a device has no more data to send, it will send a segment
with the FIN flag set. The connected device that receives the segment will respond with an ACK
to acknowledge that segment. The device that sent the ACK will then send a FIN message to
close the connection it has with the other device. The sending of the FIN should be followed with
the receipt of an ACK from the other device.
15. Which protocol or service uses UDP for a client-to-server communication and TCP for server-
to-server communication?
HTTP
FTP
DNS
SMTP
Explanation: Some applications may use both TCP and UDP. DNS uses UDP when clients send
requests to a DNS server, and TCP when two DNS serves directly communicate.
16. What is a characteristic of UDP?
UDP datagrams take the same path and arrive in the correct order at the destination.
Applications that use UDP are always considered unreliable.
UDP reassembles the received datagrams in the order they were received.
UDP only passes data to the network when the destination is ready to receive the data.
Explanation: UDP has no way to reorder the datagrams into their transmission order, so UDP
simply reassembles the data in the order it was received and forwards it to the application.
17. What kind of port must be requested from IANA in order to be used with a specific
application?
registered port
private port
dynamic port
source port
Explanation: Registered ports (numbers 1024 to 49151) are assigned by IANA to a requesting
entity to use with specific processes or applications. These processes are primarily individual
applications that a user has chosen to install, rather than common applications that would receive
a well-known port number. For example, Cisco has registered port 1985 for its Hot Standby
Routing Protocol (HSRP) process.
18. Which three application layer protocols use TCP? (Choose three.)
SMTP
FTP
SNMP
HTTP
TFTP
DHCP
Explanation: Some protocols require the reliable data transport that is provided by TCP. In
addition, these protocols do not have real time communication requirements and can tolerate
some data loss while minimizing protocol overhead. Examples of these protocols are SMTP,
FTP, and HTTP.
19. Which three statements characterize UDP? (Choose three.)
UDP provides basic connectionless transport layer functions.
UDP provides connection-oriented, fast transport of data at Layer 3.
UDP relies on application layer protocols for error detection.
UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
UDP relies on IP for error detection and recovery.
UDP provides sophisticated flow control mechanisms.
Explanation: UDP is a simple protocol that provides the basic transport layer functions. It has
much lower overhead than TCP because it is not connection-oriented and does not offer the
sophisticated retransmission, sequencing, and flow control mechanisms that provide reliability.
20. Which two fields are included in the TCP header but not in the UDP header? (Choose two.)
window
checksum
source port
destination port
sequence number
Explanation: The sequence number and window fields are included in the TCP header but not in
the UDP header.
21. Which field in the TCP header indicates the status of the three-way handshake process?
window
reserved
checksum
control bits
Explanation: The value in the control bits field of theTCP header indicates the progress and
status of the connection.
22. Why does HTTP use TCP as the transport layer protocol?
to ensure the fastest possible download speed
because HTTP is a best-effort protocol
because transmission errors can be tolerated easily
because HTTP requires reliable delivery
Explanation: When a host requests a web page, transmission reliability and completeness must
be guaranteed. Therefore, HTTP uses TCP as its transport layer protocol.
23. Which two types of applications are best suited for UDP? (Choose two.)
27. Which three statements describe a DHCP Discover message? (Choose three.)
wireless networking
social networking without the Internet
network printing using a print server
resource sharing without a dedicated server
Explanation: The peer-to-peer (P2P) networking model allows data, printer, and resource
sharing without a dedicated server.
37. The application layer of the TCP/IP model performs the functions of what three layers
of the OSI model? (Choose three.)
physical
session
network
presentation
data link
transport
application
Explanation: The network access layer of the TCP/IP model performs the same functions as the
physical and data link layers of the OSI model. The internetwork layer equates to the network
layer of the OSI model. The transport layers are the same in both models. The application layer
of the TCP/IP model represents the session, presentation, and application layers of the OSI
model.
38. What is an example of network communication that uses the client-server model?
A user uses eMule to download a file that is shared by a friend after the file location is determined.
A workstation initiates an ARP to find the MAC address of a receiving host.
A user prints a document by using a printer that is attached to a workstation of a coworker.
A workstation initiates a DNS request when the user types www.cisco.com in the address bar
of a web browser.
Explanation: When a user types a domain name of a website into the address bar of a web
browser, a workstation needs to send a DNS request to the DNS server for the name resolution
process. This request is a client/server model application. The eMule application is P2P. Sharing
a printer on a workstation is a peer-to-peer network. Using ARP is just a broadcast message sent
by a host.
39. Which layer in the TCP/IP model is used for formatting, compressing, and encrypting
data?
internetwork
session
presentation
application
network access
Explanation: The application layer of the TCP/IP model performs the functions of three layers
of the OSI model – application, presentation, and session. The application layer of the TCP/IP
model is the layer that provides the interface between the applications, is responsible for
formatting, compressing, and encrypting data, and is used to create and maintain dialogs between
source and destination applications.
40. What is an advantage of SMB over FTP?
Only with SMB can data transfers occur in both directions.
Only SMB establishes two simultaneous connections with the client, making the data transfer
faster.
SMB is more reliable than FTP because SMB uses TCP and FTP uses UDP.
SMB clients can establish a long-term connection to the server.
Explanation: SMB and FTP are client/server protocols that are used for file transfer. SMB
allows the connecting device to access resources as if they were on the local client device. SMB
and FTP use the TCP protocol for connection establishment and they can transfer data in both
directions. FTP requires two connections between the client and the server, one for commands
and replies, the other for the actual file transfer.
41. A manufacturing company subscribes to certain hosted services from its ISP. The
services that are required include hosted world wide web, file transfer, and e-mail. Which
protocols represent these three key applications? (Choose three.)
FTP
HTTP
DNS
SNMP
DHCP
SMTP
Explanation: The ISP uses the HTTP protocol in conjunction with hosting web pages, the FTP
protocol with file transfers, and SMTP with e-mail. DNS is used to translate domain names to IP
addresses. SNMP is used for network management traffic. DHCP ic commonly used to manage
IP addressing.
42. Which application layer protocol uses message types such as GET, PUT, and POST?
DNS
DHCP
SMTP
HTTP
POP3
Explanation: The GET command is a client request for data from a web server. A PUT
command uploads resources and content, such as images, to a web server. A POST command
uploads data files to a web server.
43. What type of information is contained in a DNS MX record?
the FQDN of the alias used to identify a service
the IP address for an FQDN entry
the domain name mapped to mail exchange servers
the IP address of an authoritative name server
Explanation: MX, or mail exchange messages, are used to map a domain name to several mail
exchange servers that all belong to the same domain.
44. Which three protocols operate at the application layer of the TCP/IP model? (Choose
three.)
ARP
TCP
UDP
FTP
POP3
DHCP
Explanation: FTP, DHCP, and POP3 are application layer protocols. TCP and UDP are
transport layer protocols. ARP is a network layer protocol.
45. Which protocol is used by a client to communicate securely with a web server?
SMTP
SMB
IMAP
HTTPS
Explanation: HTTPS is a secure form of HTTP used to access web content hosted by a web
server.
46. Which applications or services allow hosts to act as client and server at the same time?
client/server applications
email applications
P2P applications
authentication services
Explanation: P2P applications allow the clients to behave as servers if needed. When using
authentication services, email exchange, and client/server applications, one host acts as server
and the other acts as client at all times.
scalability
one way data flow
decentralized resources
centralized user accounts
resource sharing without a dedicated server
Explanation: Peer-to-peer networks have decentralized resources because every computer can
serve as both a server and a client. One computer might assume the role of server for one
transaction while acting as a client for another transaction. Peer-to-peer networks can share
resources among network devices without the use of a dedicated server.
48. Which scenario describes a function provided by the transport layer?
A student is using a classroom VoIP phone to call home. The unique identifier burned into the
phone is a transport layer address used to contact another network device on the same network.
A student is playing a short web-based movie with sound. The movie and sound are encoded
within the transport layer header.
A student has two web browser windows open in order to access two web sites. The transport
layer ensures the correct web page is delivered to the correct browser window.
A corporate worker is accessing a web server located on a corporate network. The transport layer
formats the screen so the web page appears properly no matter what device is being used to view
the web site.
Explanation: The source and destination port numbers are used to identify the correct
application and window within that application.
49. Which three layers of the OSI model provide similar network services to those provided
by the application layer of the TCP/IP model? (Choose three.)
physical layer
session layer
transport layer
application layer
presentation layer
data link layer
Explanation: The three upper layers of the OSI model, the session, presentation, and application
layers, provide application services similar to those provided by the TCP/IP model application
layer. Lower layers of the OSI model are more concerned with data flow.
50. A PC that is communicating with a web server has a TCP window size of 6,000 bytes
when sending data and a packet size of 1,500 bytes. Which byte of information will the web
server acknowledge after it has received two packets of data from the PC?
3001
6001
4500
6000
51. A PC that is communicating with a web server has a TCP window size of 6,000 bytes
when sending data and a packet size of 1,500 bytes. Which byte of information will the web
server acknowledge after it has received three packets of data from the PC?
4501
6001
6000
4500
52. A PC that is communicating with a web server has a TCP window size of 6,000 bytes
when sending data and a packet size of 1,500 bytes. Which byte of information will the web
server acknowledge after it has received four packets of data from the PC?
6001
3001
1501
1500
60. A client creates a packet to send to a server. The client is requesting TFTP service.
What number will be used as the destination port number in the sending packet?
69
67
53
80
61. A client creates a packet to send to a server. The client is requesting FTP service. What
number will be used as the destination port number in the sending packet?
21
69
67
80
62. A client creates a packet to send to a server. The client is requesting SSH service. What
number will be used as the destination port number in the sending packet?
22
69
67
80
63. A client creates a packet to send to a server. The client is requesting HTTP service.
What number will be used as the destination port number in the sending packet?
80
67
53
69
64. A client creates a packet to send to a server. The client is requesting POP3 service.
What number will be used as the destination port number in the sending packet?
110
67
53
69
443
161
80
65. A client creates a packet to send to a server. The client is requesting telnet service.
What number will be used as the destination port number in the sending packet?
23
443
161
110
67. A client creates a packet to send to a server. The client is requesting SNMP service.
What number will be used as the destination port number in the sending packet?
161
443
110
80
68. A client creates a packet to send to a server. The client is requesting SMTP service.
What number will be used as the destination port number in the sending packet?
25
443
161
110
69. A client creates a packet to send to a server. The client is requesting HTTPS service.
What number will be used as the destination port number in the sending packet?
443
161
110
80
CCNA 1 v7 Modules 16 – 17: Building and Securing a
Small Network Exam Answers
Introduction to Networks ( Version 7.00) – Modules 16 – 17:
Building and Securing a Small Network Exam
1. Which component is designed to protect against unauthorized communications to
and from a computer?
security center
port scanner
antimalware
antivirus
firewall
2. Which command will block login attempts on RouterA for a period of 30 seconds
if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 10 attempts 2 within 30
RouterA(config)# login block-for 30 attempts 2 within 10
RouterA(config)# login block-for 2 attempts 30 within 10
RouterA(config)# login block-for 30 attempts 10 within 2
3. What is the purpose of the network security accounting function?
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions
4. What type of attack may involve the use of tools such as nslookup and fping?
access attack
reconnaissance attack
denial of service attack
worm attack
5. Match each weakness with an example. (Not all options are used.)
Explanation:
After an intruder gains access to a network, common network threats are as
follows:
Information theft
Identity theft
Data loss or manipulation
Disruption of service
Cracking the password for a known username is a type of access attack.
7. Which example of malicious code would be classified as a Trojan horse?
malware that was written to look like a video game
malware that requires manual user intervention to spread between systems
malware that attaches itself to a legitimate program and spreads to other
programs when launched
malware that can automatically spread from one system to another by
exploiting a vulnerability in the target
Explanation: A Trojan horse is malicious code that has been written specifically
to look like a legitimate program. This is in contrast to a virus, which simply
attaches itself to an actual legitimate program. Viruses require manual
intervention from a user to spread from one system to another, while a worm is
able to spread automatically between systems by exploiting vulnerabilities on
those devices.
8. What is the difference between a virus and a worm?
Viruses self-replicate but worms do not.
Worms self-replicate but viruses do not.
Worms require a host file but viruses do not.
Viruses hide in legitimate programs but worms do not.
Explanation: Worms are able to self-replicate and exploit vulnerabilities on
computer networks without user participation.
9. Which attack involves a compromise of data that occurs between two end points?
denial-of-service
man-in-the-middle attack
extraction of security parameters
username enumeration
Explanation: Threat actors frequently attempt to access devices over the internet
through communication protocols. Some of the most popular remote exploits are
as follows:
Man-In-the-middle attack (MITM) – The threat actor gets between devices in
the system and intercepts all of the data being transmitted. This information
could simply be collected or modified for a specific purpose and delivered to
its original destination.
Eavesdropping attack – When devices are being installed, the threat actor
can intercept data such as security keys that are used by constrained
devices to establish communications once they are up and running.
SQL injection (SQLi) – Threat actors uses a flaw in the Structured Query
Language (SQL) application that allows them to have access to modify the
data or gain administrative privileges.
Routing attack – A threat actor could either place a rogue routing device on
the network or modify routing packets to manipulate routers to send all
packets to the chosen destination of the threat actor. The threat actor could
then drop specific packets, known as selective forwarding, or drop all
packets, known as a sinkhole attack.
10. Which type of attack involves an adversary attempting to gather information
about a network to identify vulnerabilities?
reconnaissance
DoS
dictionary
man-in-the-middle
Explanation: Reconnaissance is a type of attack where the intruder is looking for
wireless network vulnerabilities.
11. Match the description to the type of firewall filtering. (Not all options are used.)
Explanation: Stateful packet inspection: Prevents or allows access based on
whether the traffic is in response to requests from internal hosts.
URL filtering: Prevents or allows access based on web addresses or keywords.
Application filtering: Prevents or allows access based on the port numbers used
in the request.
Packet filtering: Prevents or allows access based on the IP or MAC addresses of
the source and destination.
12. What is the purpose of the network security authentication function?
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions
Explanation: Authentication, authorization, and accounting are network services
collectively known as AAA. Authentication requires users to prove who they are.
Authorization determines which resources the user can access. Accounting
keeps track of the actions of the user.
13. Which firewall feature is used to ensure that packets coming into a network are
legitimate responses to requests initiated from internal hosts?
stateful packet inspection
URL filtering
application filtering
packet filtering
Explanation: Stateful packet inspection on a firewall checks that incoming
packets are actually legitimate responses to requests originating from hosts
inside the network. Packet filtering can be used to permit or deny access to
resources based on IP or MAC address. Application filtering can permit or deny
access based on port number. URL filtering is used to permit or deny access
based on URL or on keywords.
14. When applied to a router, which command would help mitigate brute-force
password attacks against the router?
exec-timeout 30
service password-encryption
banner motd $Max failed logins = 5$
login block-for 60 attempts 5 within 60
Explanation: The login block-for command sets a limit on the maximum number
of failed login attempts allowed within a defined period of time. If this limit is
exceeded, no further logins are allowed for the specified period of time. This
helps to mitigate brute-force password cracking since it will significantly increase
the amount of time required to crack a password. The exec-timeout command
specifies how long the session can be idle before the user is disconnected.
The service password-encryption command encrypts the passwords in the running
configuration. The banner motd command displays a message to users who are
logging in to the device.
15. Identify the steps needed to configure a switch for SSH. The answer order does
not matter. (Not all options are used.)
traceroute
show cdp neighbors
Telnet
an extended ping
Explanation: An extended ping allows an administrator to select specific ping
features. For example in this situation, the network administrator could do an
extended ping and specify a source address of the gigabit Ethernet port on the
router. The destination address would be the IP address of host H1. If the ping
succeeds connectivity exists from the Ethernet router interface on R2 to device
H1.
39. Refer to the exhibit. Baseline documentation for a small company had ping
round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network
administrator checked connectivity by pinging between hosts H1 and H3 that
resulted in a round trip time of 1458/2390/6066. What does this indicate to the
network administrator?
Share TweetSharePin it
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the
question to find that question/answer. If the question is not here, find it
in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in
the shortest time. Thank you! We truly value your contribution to the website.
Explanation: A GUI, or graphical user interface, allows the user to interact with
the operating system by pointing and clicking at elements on the screen. A CLI,
or command-line interface, requires users to type commands at a prompt in order
to interact with the OS. The shell is the part of the operating system that is
closest to the user. The kernel is the part of the operating system that interfaces
with the hardware.
8. What happens when a switch receives a frame and the calculated CRC value is
different than the value that is in the FCS field?
The switch notifies the source of the bad frame.
The switch places the new CRC value in the FCS field and forwards the
frame.
The switch drops the frame.
The switch floods the frame to all ports except the port through which the
frame arrived to notify the hosts of the error.
Explanation: The purpose of the CRC value in the FCS field is to determine if the
frame has errors. If the frame does have errors, then the frame is dropped by the
switch.
9. Two network engineers are discussing the methods used to forward frames
through a switch. What is an important concept related to the cut-through method
of switching?
The fragment-free switching offers the lowest level of latency.
Fast-forward switching can be viewed as a compromise between store-and-
forward switching and fragment-free switching.
Fragment-free switching is the typical cut-through method of switching.
Packets can be relayed with errors when fast-forward switching is used.
Explanation: Fast-forward switching offers the lowest level of latency and it is the
typical cut-through method of switching. Fragment-free switching can be viewed
as a compromise between store-and-forward switching and fast-forward
switching. Because fast-forward switching starts forwarding before the entire
packet has been received, there may be times when packets are relayed with
errors.
10. Which two issues can cause both runts and giants in Ethernet networks?
(Choose two.)
using the incorrect cable type
half-duplex operations
a malfunctioning NIC
electrical interference on serial interfaces
CRC errors
Explanation: Because collisions are a normal aspect of half-duplex
communications, runt and giant frames are common by-products of those
operations. A malfunctioning NIC can also place frames on the network that are
either too short or longer than the maximum allowed length. CRC errors can
result from using the wrong type of cable or from electrical interference. Using a
cable that is too long can result in late collisions rather than runts and giants.
11. Which two functions are performed at the LLC sublayer of the OSI Data Link
Layer to facilitate Ethernet communication? (Choose two.)
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# end
192.168.235.234
203.0.113.3
192.168.235.1
10.234.235.254
192.168.234.114
16. Match the command with the device mode at which the command is entered.
(Not all options are used.)
Explanation: The enable command is entered in R1> mode. The login command
is entered in R1(config-line)# mode. The copy running-config startup-config
command is entered in R1# mode. The ip address 192.168.4.4 255.255.255.0
command is entered in R1(config-if)# mode. The service password-encryption
command is entered in global configuration mode.
17. A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
The configuration file is missing from NVRAM.
The POST process has detected hardware failure.
Explanation: The startup configuration file is stored in NVRAM and contains the
commands needed to initially configure a router. It also creates the running
configuration file that is stored in in RAM.
Retrieves email from the server by downloading the email to the local mail
application of the client.
An application that allows real-time chatting among remote users.
Allows remote access to network devices and servers.
Uses encryption to provide secure remote access to network devices and
servers.
19. Two students are working on a network design project. One student is doing the
drawing, while the other student is writing the proposal. The drawing is finished
and the student wants to share the folder that contains the drawing so that the other
student can access the file and copy it to a USB drive. Which networking model is
being used?
peer-to-peer
client-based
master-slave
point-to-point
Explanation: In a peer-to-peer (P2P) networking model, data is exchanged
between two network devices without the use of a dedicated server.
20. Which command is used to manually query a DNS server to resolve a specific
host name?
tracert
ipconfig /displaydns
nslookup
net
Explanation: The nslookup command was created to allow a user to manually
query a DNS server to resolve a given host name. The ipconfig /displaydns
command only displays previously resolved DNS entries. The tracert command
was created to examine the path that packets take as they cross a network and
can resolve a hostname by automatically querying a DNS server. The net
command is used to manage network computers, servers, printers, and network
drives.
21. Which PDU is processed when a host computer is de-encapsulating a message at
the transport layer of the TCP/IP model?
bits
frame
packet
segment
Explanation: At the transport layer, a host computer will de-encapsulate a
segment to reassemble data to an acceptable format by the application layer
protocol of the TCP/IP model.
22. Which two OSI model layers have the same functionality as two layers of the
TCP/IP model? (Choose two.)
data link
network
physical
session
transport
Explanation: The OSI transport layer is functionally equivalent to the TCP/IP
transport layer, and the OSI network layer is equivalent to the TCP/IP internet
layer. The OSI data link and physical layers together are equivalent to the
TCP/IP network access layer. The OSI session layer (with the presentation layer)
is included within the TCP/IP application layer.
23. Which three layers of the OSI model are comparable in function to the
application layer of the TCP/IP model? (Choose three.)
presentation
physical
network
data link
transport
application
session
Explanation:
The TCP/IP model consists of four layers: application, transport, internet, and
network access. The OSI model consists of seven layers: application,
presentation, session, transport, network, data link, and physical. The top three
layers of the OSI model: application, presentation, and session map to the
application layer of the TCP/IP model.
24. Network information:
* local router LAN interface: 172.19.29.254 / fe80:65ab:dcc1::10
* local router WAN interface: 198.133.219.33 / 2001:db8:FACE:39::10
* remote server: 192.135.250.103
What task might a user be trying to accomplish by using the ping
2001:db8:FACE:39::10 command?
verifying that there is connectivity within the local network
creating a network performance benchmark to a server on the company
intranet
determining the path to reach the remote server
verifying that there is connectivity to the internet
25. Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose
two.)
neighbor solicitation
router advertisement
router solicitation
protocol unreachable
route redirection
Explanation: The ICMP messages common to both ICMPv4 and ICMPv6
include: host confirmation, destination (net, host, protocol, port) or service
unreachable, time exceeded, and route redirection. Router solicitation, neighbor
solicitation, and router advertisement are new protocols implemented in ICMPv6.
26. A network technician types the command ping 127.0.0.1 at the command prompt
on a computer. What is the technician trying to accomplish?
pinging a host computer that has the IP address 127.0.0.1 on the network
tracing the path to a host computer on the network and the network has the
IP address 127.0.0.1
checking the IP address on the network card
testing the integrity of the TCP/IP stack on the local machine
Explanation: 127.0.0.1 is an address reserved by TCP/IP to test the NIC, drivers
and TCP/IP implementation of the device.
27. Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?
the virtually unlimited availability of IPv6 addresses
the use of CSMA/CA
the use of full-duplex capable Layer 2 switches
the development of half-duplex switch operation
the use of Gigabit Ethernet speeds
Explanation: The use of Layer 2 switches operating in full-duplex mode
eliminates collisions, thereby eliminating the need for CSMA/CD.
28. What does a router do when it receives a Layer 2 frame over the network
medium?
31. Given network 172.18.109.0, which subnet mask would be used if 6 host bits
were available?
255.255.192.0
255.255.224.0
255.255.255.192
255.255.255.248
255.255.255.252
Explanation:
With an IPv4 network, the subnet mask is determined by the hosts bits that are
required:
11 host bits required – 255.255.248.0
10 host bits required – 255.255.252.0
9 host bits required – 255.255.254.0
8 host bits required – 255.255.255.0
7 host bits required – 255.255.255.128
6 host bits required – 255.255.255.192
5 host bits required – 255.255.255.224
4 host bits required – 255.255.255.240
3 host bits required – 255.255.255.248
2 host bits required – 255.255.255.252
32. Three devices are on three different subnets. Match the network address and the
broadcast address with each subnet where these devices are located. (Not all options
are used.)
Device 1: IP address 192.168.10.77/28 on subnet 1
Device 2: IP address192.168.10.17/30 on subnet 2
Device 3: IP address 192.168.10.35/29 on subnet 3
Explanation: To calculate any of these addresses, write the device IP address in
binary. Draw a line showing where the subnet mask 1s end. For example, with
Device 1, the final octet (77) is 01001101. The line would be drawn between the
0100 and the 1101 because the subnet mask is /28. Change all the bits to the
right of the line to 0s to determine the network number (01000000 or 64). Change
all the bits to the right of the line to 1s to determine the broadcast address
(01001111 or 79).
link-local
public
loopback
multicast
34. What does the IP address 192.168.1.15/29 represent?
subnetwork address
unicast address
multicast address
broadcast address
Explanation: A broadcast address is the last address of any given network. This
address cannot be assigned to a host, and it is used to communicate with all
hosts on that network.
Because IPv6 has integrated security, there is no need to hide the IPv6
addresses of internal networks.
The problems that are induced by NAT applications are solved because the
IPv6 header improves packet handling by intermediate routers.
The end-to-end connectivity problems that are caused by NAT are solved
because the number of routes increases with the number of nodes that are
connected to the Internet.
Any host or user can get a public IPv6 network address because the number of
available IPv6 addresses is extremely large.
Explanation: The large number of public IPv6 addresses eliminates the need for
NAT. Sites from the largest enterprises to single households can get public IPv6
network addresses. This avoids some of the NAT-induced application problems
that are experienced by applications that require end-to-end connectivity.
36. What routing table entry has a next hop address associated with a destination
network?
directly-connected routes
local routes
remote routes
C and L source routes
Explanation: Routing table entries for remote routes will have a next hop IP
address. The next hop IP address is the address of the router interface of the
next device to be used to reach the destination network. Directly-connected and
local routes have no next hop, because they do not require going through
another router to be reached.
37. Which term describes a field in the IPv4 packet header that contains a unicast,
multicast, or broadcast address?
::1/128
fe80::30d0:115:3f57:fe4c/128
fe80::/64
2001:0:9d38:6ab8:30d0:115:3f57:fe4c/128
Explanation: In the IPv6 address scheme, the network of fe80::/10 is reserved for
link-local addresses. The address fe80::/64 is a network address that indicates,
in this workstation, fe80::/64 is actually used for link-local addresses. Thus the
address fe80::30d0:115:3f57:fe4c/128 is a valid IPv6 link-local address.
0.0.0.0
255.255.255.255
the physical address of the destination host
FFFF.FFFF.FFFF
AAAA.AAAA.AAAA
Explanation:
The purpose of an ARP request is to find the MAC address of the destination
host on an Ethernet LAN. The ARP process sends a Layer 2 broadcast to all
devices on the Ethernet LAN. The frame contains the IP address of the
destination and the broadcast MAC address, FFFF.FFFF.FFFF. The host with
the IP address that matches the IP address in the ARP request will reply with a
unicast frame that includes the MAC address of the host. Thus the original
sending host will obtain the destination IP and MAC address pair to continue the
encapsulation process for data transmission.
47. Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet
to PC3. In this scenario, what will happen next?
SW1 will send an ARP reply with its Fa0/1 MAC address.
RT1 will send an ARP reply with its own Fa0/0 MAC address.
RT1 will forward the ARP request to PC3.
RT1 will send an ARP reply with the PC3 MAC address.
RT1 will send an ARP reply with its own Fa0/1 MAC address.
Explanation: When a network device has to communicate with a device on
another network, it broadcasts an ARP request asking for the default gateway
MAC address. The default gateway (RT1) unicasts an ARP reply with the Fa0/0
MAC address.
48. A network administrator is issuing the login block-for 180 attempts 2 within 30
command on a router. Which threat is the network administrator trying to prevent?
a user who is trying to guess a password to access the router
a worm that is attempting to access another part of the network
an unidentified individual who is trying to access the network equipment
room
a device that is trying to inspect the traffic on a link
Explanation: The login block-for 180 attempts 2 within 30 command will cause
the device to block authentication after 2 unsuccessful attempts within 30
seconds for a duration of 180 seconds. A device inspecting the traffic on a link
has nothing to do with the router. The router configuration cannot prevent
unauthorized access to the equipment room. A worm would not attempt to
access the router to propagate to another part of the network.
51. The employees and residents of Ciscoville cannot access the Internet or any
remote web-based services. IT workers quickly determine that the city firewall is
being flooded with so much traffic that a breakdown of connectivity to the Internet
is occurring. Which type of attack is being launched at Ciscoville?
access
Trojan horse
reconnaissance
DoS
Explanation: A DoS (denial of service) attack prevents authorized users from
using one or more computing resources.
52. Which two statements describe the characteristics of fiber-optic cabling?
(Choose two.)
Fiber-optic cabling does not conduct electricity.
Multimode fiber-optic cabling carries signals from multiple sending devices.
Fiber-optic cabling is primarily used as backbone cabling.
Fiber-optic cabling uses LEDs for single-mode cables and laser technology
for multimode cables.
Fiber-optic cabling has high signal loss.
Explanation: Fiber-optic cabling is primarily used for high-traffic backbone cabling
and does not conduct electricity. Multimode fiber uses LEDs for signaling and
single-mode fiber uses laser technology. FIber-optic cabling carries signals from
only one device to another.
53. What OSI physical layer term describes the measure of the transfer of bits
across a medium over a given period of time?
latency
goodput
throughput
bandwidth
54. Refer to the exhibit. What is the maximum possible throughput between the PC
and the server?
10 Mb/s
1000 Mb/s
128 kb/s
100 Mb/s
Explanation: The maximum throughput between any two nodes on a network is
determined by the slowest link between those nodes.
55. Match the description with the media. (Not all options are used.)
Explanation: UTP cables are used in wired office environments. Coaxial cables
are used to connect cable modems and televisions. Fiber optics are used for high
transmission speeds and to transfer data over long distances. STP cables are
used in environments where there is a lot of interference.