Packet Tracer Module 8-10 No Answer
Packet Tracer Module 8-10 No Answer
Packet Tracer Module 8-10 No Answer
source IP address
destination IP address
source data-link address
destination data-link address
2. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?
The packet will be sent to the default gateway first, and then, depending on the response from the
gateway, it may be sent to the destination host.
The packet will be sent directly to the destination host.
The packet will first be sent to the default gateway, and then from the default gateway it will be
sent directly to the destination host.
The packet will be sent only to the default gateway.
3. A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be
forwarded out the Gigabit 0/1 interface. What will the router do next?
route the packet out the Gigabit 0/1 interface
create a new Layer 2 Ethernet frame to be sent to the destination
look into the ARP cache to determine the destination IP address
look into the routing table to determine if the destination network is in the routing table
4. Which IPv4 address can a host use to ping the loopback interface?
126.0.0.1
127.0.0.0
126.0.0.0
127.0.0.1
5. A computer can access devices on the same network but cannot access devices on other networks. What
is the probable cause of this problem?
The cable is not connected properly to the NIC.
The computer has an invalid IP address.
The computer has an incorrect subnet mask.
The computer has an invalid default gateway address.
6. Which statement describes a feature of the IP protocol?
IP encapsulation is modified based on network media.
IP relies on Layer 2 protocols for transmission error control.
MAC addresses are used during the IP packet encapsulation.
IP relies on upper layer services to handle situations of missing or out-of-order packets.
Explanation: IP protocol is a connection-less protocol, considered unreliable in terms of end-to-end
delivery. It does not provide error control in the cases where receiving packets are out-of-order or in cases
of missing packets. It relies on upper layer services, such as TCP, to resolve these issues.
7. Why is NAT not needed in IPv6?
Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal
networks.
Any host or user can get a public IPv6 network address because the number of available IPv6
addresses is extremely large.
The problems that are induced by NAT applications are solved because the IPv6 header improves
packet handling by intermediate routers.
The end-to-end connectivity problems that are caused by NAT are solved because the number of
routes increases with the number of nodes that are connected to the Internet.
Explanation: The large number of public IPv6 addresses eliminates the need for NAT. Sites from the
largest enterprises to single households can get public IPv6 network addresses. This avoids some of the
NAT-induced application problems that are experienced by applications that require end-to-end
connectivity.
8. Which parameter does the router use to choose the path to the destination when there are multiple
routes available?
the lower metric value that is associated with the destination network
the lower gateway IP address to get to the destination network
the higher metric value that is associated with the destination network
the higher gateway IP address to get to the destination network
9. What are two services provided by the OSI network layer? (Choose two.)
performing error detection
routing packets toward the destination
encapsulating PDUs from the transport layer
placement of frames on the media
collision detection
Explanation: The OSI network layer provides several services to allow communication between devices:
addressing
encapsulation
routing
de-encapsulation
Error detection, placing frames on the media, and collision detection are all functions of the data ink
layer.
10. Within a production network, what is the purpose of configuring a switch with a default gateway
address?
Hosts that are connected to the switch can use the switch default gateway address to forward
packets to a remote destination.
A switch must have a default gateway to be accessible by Telnet and SSH.
The default gateway address is used to forward packets originating from the switch to remote
networks.
It provides a next-hop address for all traffic that flows through the switch.
Explanation: A default gateway address allows a switch to forward packets that originate on the switch to
remote networks. A default gateway address on a switch does not provide Layer 3 routing for PCs that are
connected on that switch. A switch can still be accessible from Telnet as long as the source of the Telnet
connection is on the local network.
11. What is a basic characteristic of the IP protocol?
connectionless
media dependent
user data segmentation
reliable end-to-end delivery
Explanation: Internet Protocol (IP) is a network layer protocol that does not require initial exchange of
control information to establish an end-to-end connection before packets are forwarded. Thus, IP is
connectionless and does not provide reliable end-to-end delivery by itself. IP is media independent. User
data segmentation is a service provided at the transport layer.
12. Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?
Time-to-Live
Sequence Number
Acknowledgment Number
Differentiated Services
Explanation: The value of the Time-to-Live (TTL) field in the IPv4 header is used to limit the lifetime of
a packet. The sending host sets the initial TTL value; which is decreased by one each time the packet is
processed by a router. If the TTL field decrements to zero, the router discards the packet and sends an
Internet Control Message Protocol (ICMP) Time Exceeded message to the source IP address. The
Differentiated Services (DS) field is used to determine the priority of each packet. Sequence Number and
Acknowledgment Number are two fields in the TCP header.
13. What is one advantage that the IPv6 simplified header offers over IPv4?
smaller-sized header
little requirement for processing checksums
smaller-sized source and destination IP addresses
efficient packet handling
Explanation: The IPv6 simplified header offers several advantages over IPv4:
Better routing efficiency and efficient packet handling for performance and forwarding-rate
scalability
No requirement for processing checksums
Simplified and more efficient extension header mechanisms (as opposed to the IPv4 Options
field)
A Flow Label field for per-flow processing with no need to open the transport inner packet to
identify the various traffic flows
14. What IPv4 header field identifies the upper layer protocol carried in the packet?
Protocol
Identification
Version
Differentiated Services
Explanation: It is the Protocol field in the IP header that identifies the upper-layer protocol the packet is
carrying. The Version field identifies the IP version. The Differential Services field is used for setting
packet priority. The Identification field is used to reorder fragmented packets.
15. Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the
router. (Not all targets are used.)
Explanation: Packets with a destination of 172.17.6.15 are forwarded through Fa0/0. Packets with a
destination of 172.17.10.5 are forwarded through Fa1/1. Packets with a destination of 172.17.12.10 are
forwarded through Fa1/0. Packets with a destination of 172.17.14.8 are forwarded through Fa0/1.
Because network 172.17.8.0 has no entry in the routing table, it will take the gateway of last resort, which
means that packets with a destination of 172.17.8.20 are forwarded through Serial0/0/0. Because a
gateway of last resort exists, no packets will be dropped.
16. What information does the loopback test provide?
The TCP/IP stack on the device is working correctly.
The device has end-to-end connectivity.
DHCP is working correctly.
The Ethernet cable is working correctly.
The device has the correct IP address on the network.
Explanation: Because the loopback test sends packets back to the host device, it does not provide
information about network connectivity to other hosts. The loopback test verifies that the host NIC,
drivers, and TCP/IP stack are functioning.
17. What routing table entry has a next hop address associated with a destination network?
directly-connected routes
local routes
remote routes
C and L source routes
Explanation: Routing table entries for remote routes will have a next hop IP address. The next hop IP
address is the address of the router interface of the next device to be used to reach the destination
network. Directly-connected and local routes have no next hop, because they do not require going through
another router to be reached.
18. How do hosts ensure that their packets are directed to the correct network destination?
They have to keep their own local routing table that contains a route to the loopback interface, a
local network route, and a remote default route.
They always direct their packets to the default gateway, which will be responsible for the packet
delivery.
They search in their own local routing table for a route to the network destination address and
pass this information to the default gateway.
They send a query packet to the default gateway asking for the best route.
Explanation: Hosts must maintain their own local routing table to ensure that network layer packets are
directed to the correct destination network. This local table typically contains a route to the loopback
interface, a route to the network that the host is connected to, and a local default route, which represents
the route that packets must take to reach all remote network addresses.
19. When transporting data from real-time applications, such as streaming audio and video, which field in
the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets
in the same conversation?
Next Header
Flow Label
Traffic Class
Differentiated Services
Explanation: The Flow Label in IPv6 header is a 20-bit field that provides a special service for real-time
applications. This field can be used to inform routers and switches to maintain the same path for the
packet flow so that packets will not be reordered.
20. What statement describes the function of the Address Resolution Protocol?
ARP is used to discover the IP address of any host on a different network.
ARP is used to discover the IP address of any host on the local network.
ARP is used to discover the MAC address of any host on a different network.
ARP is used to discover the MAC address of any host on the local network.
Explanation: When a PC wants to send data on the network, it always knows the IP address of the
destination. However, it also needs to discover the MAC address of the destination. ARP is the protocol
that is used to discover the MAC address of a host that belongs to the same network.
21. Under which two circumstances will a switch flood a frame out of every port except the port that the
frame was received on? (Choose two.)
The frame has the broadcast address as the destination address.
The destination address is unknown to the switch.
The source address in the frame header is the broadcast address.
The source address in the frame is a multicast address.
The destination address in the frame is a known unicast address.
Explanation: A switch will flood a frame out of every port, except the one that the frame was received
from, under two circumstances. Either the frame has the broadcast address as the destination address, or
the destination address is unknown to the switch.
22. Which statement describes the treatment of ARP requests on the local link?
They must be forwarded by all routers on the local network.
They are received and processed by every device on the local network.
They are dropped by all switches on the local network.
They are received and processed only by the target device.
Explanation: One of the negative issues with ARP requests is that they are sent as a broadcast. This means
all devices on the local link must receive and process the request.
23. Which destination address is used in an ARP request frame?
0.0.0.0
255.255.255.255
FFFF.FFFF.FFFF
AAAA.AAAA.AAAA
the physical address of the destination host
Explanation: The purpose of an ARP request is to find the MAC address of the destination host on an
Ethernet LAN. The ARP process sends a Layer 2 broadcast to all devices on the Ethernet LAN. The frame
contains the IP address of the destination and the broadcast MAC address, FFFF.FFFF.FFFF. The host
with the IP address that matches the IP address in the ARP request will reply with a unicast frame that
includes the MAC address of the host. Thus the original sending host will obtain the destination IP and
MAC address pair to continue the encapsulation process for data transmission.
24. A network technician issues the arp -d * command on a PC after the router that is connected to the
LAN is reconfigured. What is the result after this command is issued?
The ARP cache is cleared.
The current content of the ARP cache is displayed.
The detailed information of the ARP cache is displayed.
The ARP cache is synchronized with the router interface.
Explanation: Issuing the arp –d * command on a PC will clear the ARP cache content. This is helpful
when a network technician wants to ensure the cache is populated with updated information.
25. Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC
address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the
frame?
32. A new network administrator has been asked to enter a banner message on a Cisco device. What is the
fastest way a network administrator could test whether the banner is properly configured?
Reboot the device.
Enter CTRL-Z at the privileged mode prompt.
Exit global configuration mode.
Power cycle the device.
Exit privileged EXEC mode and press Enter.
Explanation: While at the privileged mode prompt such as Router#, type exit,press Enter, and the banner
message appears. Power cycling a network device that has had the banner motd command issued will also
display the banner message, but this is not a quick way to test the configuration.
33. A network administrator requires access to manage routers and switches locally and remotely. Match
the description to the access method. (Not all options are used.)
Explanation: Both the console and AUX ports can be used to directly connect to a Cisco network device
for management purposes. However, it is more common to use the console port. The AUX port is more
often used for remote access via a dial up connection. SSH and Telnet are both remote access methods
that depend on an active network connection. SSH uses a stronger password authentication than Telnet
uses and also uses encryption on transmitted data.
34. Match the phases to the functions during the boot up process of a Cisco router. (Not all options are
used.)
Explanation: There are three major phases to the bootup process of a Cisco router:
1. Perform the POST and load the bootstrap program.
2. Locate and load the Cisco IOS software.
3. Locate and load the startup configuration file
If a startup configuration file cannot be located, the router will enter setup mode by displaying the setup
mode prompt.
35. Match the command with the device mode at which the command is entered. (Not all options are
used.)
Explanation: The enable command is entered in R1> mode. The login command is entered in R1(config-
line)# mode. The copy running-config startup-config command is entered in R1# mode. The ip address
192.168.4.4 255.255.255.0 command is entered in R1(config-if)# mode. The service password-
encryption command is entered in global configuration mode.
36. What are two functions of NVRAM? (Choose two.)
to store the routing table
to retain contents when power is removed
to store the startup configuration file
to contain the running configuration file
to store the ARP table
Explanation: NVRAM is permanent memory storage, so the startup configuration file is preserved even if
the router loses power.
37. A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
The configuration file is missing from NVRAM.
The POST process has detected hardware failure.
Explanation: If a router cannot locate the startup-config file in NVRAM, it will enter setup mode to allow
the configuration to be entered from the console device.
38. The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is
the effect of this command?
The switch will have a management interface with the address 172.16.100.1.
The switch can be remotely managed from a host on another network.
The switch can communicate with other hosts on the 172.16.100.0 network.
The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.
Explanation: A default gateway address is typically configured on all devices to allow them to
communicate beyond just their local network.In a switch this is achieved using the command ip default-
gateway <ip address>.
39. What happens when the transport input ssh command is entered on the switch vty lines?
The SSH client on the switch is enabled.
Communication between the switch and remote users is encrypted.
The switch requires a username/password combination for remote access.
The switch requires remote connections via a proprietary client software.
Explanation: The transport input ssh command when entered on the switch vty (virtual terminal lines) will
encrypt all inbound controlled telnet connections.
40. Refer to the exhibit. A user PC has successfully transmitted packets to www.cisco.com. Which IP
address does the user PC target in order to forward its data off the local network?
172.24.255.17
172.24.1.22
172.20.0.254
172.24.255.4
172.20.1.18
41. Match the configuration mode with the command that is available in that mode. (Not all options are
used.)
Explanation: The enable command is entered at the R1> prompt. The login command is entered at the
R1(config-line)# prompt. The copy running-config startup-config command is entered at the R1# prompt.
The interface fastethernet 0/0 command is entered at the R1(config)# prompt.
42. Which three commands are used to set up secure access to a router through a connection to the
console interface? (Choose three.)
interface fastethernet 0/0
line vty 0 4
line console 0
enable secret cisco
login
password cisco
Explanation: The three commands needed to password protect the console port are as follows:
line console 0
password cisco
login
The interface fastethernet 0/0 command is commonly used to access the configuration mode used to apply
specific parameters such as the IP address to the Fa0/0 port. The line vty 0 4 command is used to access
the configuration mode for Telnet. The0and 4 parameters specify ports 0 through 4, or a maximum of five
simultaneous Telnet connections. The enable secret command is used to apply a password used on the
router to access the privileged mode.
43. Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of
the default gateway address?
It is the IP address of the Router1 interface that connects the company to the Internet.
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the ISP network device located in the cloud.
Explanation: The default gateway is used to route packets destined for remote networks. The default
gateway IP address is the address of the first Layer 3 device (the router interface) that connects to the
same network.
44. Which two functions are primary functions of a router? (Choose two.)
packet forwarding
microsegmentation
domain name resolution
path selection
flow control
Explanation: A router accepts a packet and accesses its routing table to determine the appropriate exit
interface based on the destination address. The router then forwards the packet out of that interface.
45. What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
Explanation: The command copy running-config startup-config copies the running-configuration file
from RAM into NVRAM and saves it as the startup-configuration file. Since NVRAM is none-volatile
memory it will be able to retain the configuration details when the router is powered off.
46. What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.
Explanation: When a host needs to send a message to another host located on the same network, it can
forward the message directly. However, when a host needs to send a message to a remote network, it must
use the router, also known as the default gateway. This is because the data link frame address of the
remote destination host cannot be used directly. Instead, the IP packet has to be sent to the router (default
gateway) and the router will forward the packet toward its destination. Therefore, if the default gateway is
incorrectly configured, the host can communicate with other hosts on the same network, but not with
hosts on remote networks.
47. What are two potential network problems that can result from ARP operation? (Choose two.)
Manually configuring static ARP associations could facilitate ARP poisoning or MAC address
spoofing.
On large networks with low bandwidth, multiple ARP broadcasts could cause data
communication delays.
Network attackers could manipulate MAC address and IP address mappings in ARP messages
with the intent of intercepting network traffic.
Large numbers of ARP request broadcasts could cause the host MAC address table to overflow
and prevent the host from communicating on the network.
Multiple ARP replies result in the switch MAC address table containing entries that match the
MAC addresses of hosts that are connected to the relevant switch port.
Explanation: Large numbers of ARP broadcast messages could cause momentary data communications
delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages
with the intent to intercept network traffic. ARP requests and replies cause entries to be made into the
ARP table, not the MAC address table. ARP table overflows are very unlikely. Manually configuring
static ARP associations is a way to prevent, not facilitate, ARP poisoning and MAC address spoofing.
Multiple ARP replies resulting in the switch MAC address table containing entries that match the MAC
addresses of connected nodes and are associated with the relevant switch port are required for normal
switch frame forwarding operations. It is not an ARP caused network problem.
48. Open the PT activity. Perform the tasks in the activity instructions and then answer the question.