Packet Tracer Module 1-10 Answer Key
Packet Tracer Module 1-10 Answer Key
During a routine inspection, a technician discovered that software that was installed on a
computer was secretly collecting data about websites that were visited by users of the computer.
Which type of threat is affecting this computer?
DoS attack
identity theft
spyware
zero-day attack
2. Which term refers to a network that provides secure access to the corporate offices by suppliers,
customers and collaborators?
Internet
intranet
extranet
extendednet
3. A large corporation has modified its network to allow users to access network resources from
their personal laptops and smart phones. Which networking trend does this describe?
cloud computing
online collaboration
bring your own device
video conferencing
4. What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices
in one.
5. Match the requirements of a reliable network with the supporting network architecture. (Not all
options are used.)
6. An employee at a branch office is creating a quote for a customer. In order to do this, the
employee needs to access confidential pricing information from internal servers at the Head Office.
What type of network would the employee access?
an intranet
the Internet
an extranet
a local area network
Explanation: Intranet is a term used to refer to a private connection of LANs and WANs that belongs to
an organization. An intranet is designed to be accessible only by the organization’s members, employees,
or others with authorization.
18. Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the
administrator uses a console connection to connect to the switch, which password is needed to
access user EXEC mode?
22. Which two host names follow the guidelines for naming conventions on Cisco IOS devices?
(Choose two.)
Branch2!
RM-3-Switch-2A4
Floor(15)
HO Floor 17
SwBranch799
Explanation: Some guidelines for naming conventions are that names should:
Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters in length
23. How is SSH different from Telnet?
SSH makes connections over the network, whereas Telnet is for out-of-band access.
SSH provides security to remote sessions by encrypting messages and using user
authentication. Telnet is considered insecure and sends messages in plaintext.
SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to
connect to devices through the use of Telnet.
SSH must be configured over an active network connection, whereas Telnet is used to connect to
a device from a console connection.
Explanation: SSH is the preferred protocol for connecting to a device operating system over the network
because it is much more secure than Telnet. Both SSH and Telnet are used to connect to devices over the
network, and so are both used in-band. PuTTY and Terra Term can be used to make both SSH and Telnet
connections.
24. An administrator is configuring a switch console port with a password. In what order will the
administrator travel through the IOS modes of operation in order to reach the mode in which the
configuration commands will be entered? (Not all options are used.)
32. A network administrator enters the service password-encryption command into the
configuration mode of a router. What does this command accomplish?
This command encrypts passwords as they are transmitted across serial WAN links.
This command prevents someone from viewing the running configuration passwords.
This command enables a strong encryption algorithm for the enable secret password command.
This command automatically encrypts passwords in configuration files that are currently stored in
NVRAM.
This command provides an exclusive encrypted password for external service personnel who are
required to do router maintenance.
Explanation: The startup-config and running-config files display most passwords in plaintext. Use the
service password-encryption global config command to encrypt all plaintext passwords in these files.
33. What method can be used by two computers to ensure that packets are not dropped because too
much data is being sent too quickly?
encapsulation
flow control
access method
response timeout
Explanation: In order for two computers to be able to communicate effectively, there must be a
mechanism that allows both the source and destination to set the timing of the transmission and receipt of
data. Flow control allows for this by ensuring that data is not sent too fast for it to be received properly.
34. Which statement accurately describes a TCP/IP encapsulation process when a PC is sending
data to the network?
Data is sent from the internet layer to the network access layer.
Packets are sent from the network access layer to the transport layer.
Segments are sent from the transport layer to the internet layer.
Frames are sent from the network access layer to the internet layer.
Explanation: When the data is traveling from the PC to the network, the transport layer sends segments
to the internet layer. The internet layer sends packets to the network access layer, which creates frames
and then converts the frames to bits. The bits are released to the network media.
35. What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
ARP
DHCP
DNS
FTP
NAT
PPP
Explanation: DNS, DHCP, and FTP are all application layer protocols in the TCP/IP protocol suite. ARP
and PPP are network access layer protocols, and NAT is an internet layer protocol in the TCP/IP protocol
suite.
36. Match the description to the organization. (Not all options are used.)
Explanation: The EIA is an international standards and trade organization for electronics organizations.
It is best known for its standards related to electrical wiring, connectors, and the 19-inch racks used to
mount networking equipment.
37. Which name is assigned to the transport layer PDU?
bits
data
frame
packet
segment
Explanation: Application data is passed down the protocol stack on its way to be transmitted across the
network media. During the process, various protocols add information to it at each level. At each stage of
the process, a PDU (protocol data unit) has a different name to reflect its new functions. The PDUs are
named according to the protocols of the TCP/IP suite:
Data – The general term for the PDU used at the application layer.
Segment – transport layer PDU
Packet – network layer PDU
Frame – data link layer PDU
Bits – A physical layer PDU used when physically transmitting data over the medium
38. When IPv4 addressing is manually configured on a web server, which property of the IPv4
configuration identifies the network and host portion for an IPv4 address?
DNS server address
subnet mask
default gateway
DHCP server address
Explanation: There are several components that need to be entered when configuring IPv4 for an end
device:
IPv4 address – uniquely identifies an end device on the network
Subnet mask – determines the network address portion and host portion for an IPv4 address
Default gateway – the IP address of the router interface used for communicating with hosts in another
network
DNS server address – the IP address of the Domain Name System (DNS) server
DHCP server address (if DHCP is used) is not configured manually on end devices. It will be provided by
a DHCP server when an end device requests an IP address.
39. What process involves placing one PDU inside of another PDU?
encapsulation
encoding
segmentation
flow control
Explanation: When a message is placed inside of another message, this is known as encapsulation. On
networks, encapsulation takes place when one protocol data unit is carried inside of the data field of the
next lower protocol data unit.
40. What layer is responsible for routing messages through an internetwork in the TCP/IP model?
internet
transport
network access
session
Explanation: The TCP/IP model consists of four layers: application, transport, internet, and network
access. Of these four layers, it is the internet layer that is responsible for routing messages. The session
layer is not part of the TCP/IP model but is rather part of the OSI model.
41. For the TCP/IP protocol suite, what is the correct order of events when a Telnet message is being
prepared to be sent over the network?
Modules 1 - 3: Basic Network Connectivity and Communications Exam - Packet Tracer 0.00
KB 15176 downloads
...
Download
What is the IP address of the switch virtual interface (SVI) on Switch0?
192.168.5.10
192.168.10.5
192.168.10.1
192.168.5.0
Explanation: After the enable command is issued, the show running-configuration command or the show
ip interfaces brief command will display the IP address of the switch virtual interface (SVI).
53. Why would a Layer 2 switch need an IP address?
to enable the switch to send broadcast frames to attached PCs
to enable the switch to function as a default gateway
to enable the switch to be managed remotely
to enable the switch to receive frames from attached PCs
Explanation: A switch, as a Layer 2 device, does not need an IP address to transmit frames to attached
devices. However, when a switch is accessed remotely through the network, it must have a Layer 3
address. The IP address must be applied to a virtual interface rather than to a physical interface. Routers,
not switches, function as default gateways.
54. Refer to the exhibit. An administrator is trying to configure the switch but receives the error
message that is displayed in the exhibit. What is the problem?
CCNA-1-v7-Modules-1-3-Basic Network Connectivity and Communications Exam Answers 54
The entire command, configure terminal, must be used.
The administrator is already in global configuration mode.
The administrator must first enter privileged EXEC mode before issuing the command.
The administrator must connect via the console port to access global configuration mode.
Explanation: In order to enter global configuration mode, the command configure terminal, or a
shortened version such as config t, must be entered from privileged EXEC mode. In this scenario the
administrator is in user EXEC mode, as indicated by the > symbol after the hostname. The administrator
would need to use the enable command to move into privileged EXEC mode before entering the
configure terminal command.
55. What term describes a network owned by one organization that provides safe and secure access
to individuals who work for a different organization?
extranet
cloud
BYOD
quality of service
56. What term describes storing personal files on servers over the internet to provide access
anywhere, anytime, and on any device?
cloud
BYOD
quality of service
converged network
57. What term describes a network where one computer can be both client and server?
peer-to-peer
cloud
BYOD
quality of service
58. What term describes a type of network used by people who work from home or from a small
remote office?
SOHO network
BYOD
quality of service
converged network
59. What term describes a computing model where server software runs on dedicated computers?
client/server
internet
intranet
extranet
61. What term describes a technology that allows devices to connect to the LAN using an electrical
outlet?
powerline networking
internet
intranet
extranet
62. What term describes a policy that allows network devices to manage the flow of data to give
priority to voice and video?
quality of service
internet
intranet
extranet
63. What term describes a private collection of LANs and WANs that belongs to an organization?
intranet
internet
extranet
peer-to-peer
64. What term describes the ability to use personal devices across a business or campus network?
BYOD
internet
intranet
extranet
65. At which OSI layer is a source IP address added to a PDU during the encapsulation process?
network layer
data link layer
transport layer
application layer
66. At which OSI layer is a destination port number added to a PDU during the encapsulation
process?
transport layer
data link layer
network layer
application layer
67. At which OSI layer is data added to a PDU during the encapsulation process?
application layer
data link layer
network layer
transport layer
68. At which OSI layer is a source IP address added to a PDU during the encapsulation process?
network layer
data link layer
application layer
presentation layer
69. Which of the following is the name for all computers connected to a network that participate
directly in network communication?
Servers
Intermediary device
Host
media
Explanation: Hosts are all computers connected to a network that participate directly in network
communication.
70. At which OSI layer is a destination IP address added to a PDU during the encapsulation
process?
network layer
application layer
transport layer
presentation layer
71. At which OSI layer is a source MAC address added to a PDU during the encapsulation process?
data link layer
application layer
transport layer
presentation layer
72. At which OSI layer is a source port number added to a PDU during the encapsulation process?
transport layer
application layer
network layer
presentation layer
data link layer
73. At which OSI layer is a destination MAC address added to a PDU during the encapsulation
process?
data link layer
transport layer
application layer
network layer
74. When data is encoded as pulses of light, which media is being used to transmit the data?
Wireless
Fire optic cable
Copper cable
Explanation: Fiber-optic cable is the media is being used to transmit the data when data is encoded as
pulses of light.
75. Which two devices are intermediary devices? (Choose two)
Host
Router
Switch
Servers
Explanation: Routers and switches are intermediary devices.
1. What is the purpose of the OSI physical layer?
controlling access to media
transmitting bits across the local media
performing error detection on received frames
exchanging frames between nodes over physical network media
2. Why are two strands of fiber used for a single fiber optic connection?
The two strands allow the data to travel for longer distances without degrading.
They prevent crosstalk from causing interference on the connection.
They increase the speed at which the data can travel.
They allow for full-duplex connectivity.
3. Which characteristic describes crosstalk?
the distortion of the network signal from fluorescent lighting
the distortion of the transmitted messages from signals carried in adjacent wires
the weakening of the network signal over long cable lengths
the loss of wireless signal over excessive distance from the access point
4. Which procedure is used to reduce the effect of crosstalk in copper cables?
requiring proper grounding connections
twisting opposing circuit wire pairs together
wrapping the bundle of wires with metallic shielding
designing a cable infrastructure to avoid crosstalk interference
avoiding sharp bends during installation
5. Match the situation with the appropriate use of network media.
6. A network administrator is measuring the transfer of bits across the company backbone for a
mission critical financial application. The administrator notices that the network throughput
appears lower than the bandwidth expected. Which three factors could influence the differences in
throughput? (Choose three.)
the amount of traffic that is currently crossing the network
the sophistication of the encapsulation method applied to the data
the type of traffic that is crossing the network
the latency that is created by the number of network devices that the data is crossing
the bandwidth of the WAN connection to the Internet
the reliability of the gigabit Ethernet infrastructure of the backbone
Explanation: Throughput usually does not match the specified bandwidth of physical links due to
multiple factors. These factors include, the amount of traffic, type of traffic, and latency created by the
network devices the data has to cross.
8. What is a primary role of the Physical layer in transmitting data on the network?
create the signals that represent the bits in each frame on to the media
provide physical addressing to the devices
determine the path packets take through the network
control data access to the media
Explanation: The OSI physical layer provides the means to transport the bits that make up a frame across
the network media. This layer accepts a complete frame from the data link layer and encodes it as a series
of signals that are transmitted to the local media.
9. With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within
the cable pairs?
the magnetic field around the adjacent pairs of wire
the use of braided wire to shield the adjacent wire pairs
the reflection of the electrical wave back from the far end of the cable
the collision caused by two nodes trying to use the media simultaneously
Explanation: Crosstalk is a type of noise, or interference that occurs when signal transmission on one
wire interferes with another wire. When current flows through a wire a magnetic field is produced. The
produced magnetic field will interface the signal carried in the adjacent wire.
10. Refer to the graphic. What type of cabling is shown?
STP
UTP
coax
fiber
Explanation: Network cabling include different types of cables:
UTP cable consists of four pairs of color-coded wires that have been twisted together and then
encased in a flexible plastic sheath.
STP cable uses four pairs of wires, each wrapped in a foil shield, which are then wrapped in an
overall metallic braid or foil.
Coaxial cable uses a copper conductor and a layer of flexible plastic insulation surrounds the
copper conductor.
Fiber cable is a flexible, extremely thin, transparent strand of glass surrounded by plastic
insulation.
11. In addition to the cable length, what two factors could interfere with the communication carried
over UTP cables? (Choose two.)
crosstalk
bandwidth
size of the network
signal modulation technique
electromagnetic interference
Explanation: Copper media is widely used in network communications. However, copper media is
limited by distance and signal interference. Data is transmitted on copper cables as electrical pulses. The
electrical pulses are susceptible to interference from two sources:
Electromagnetic interference (EMI) or radio frequency interference (RFI) – EMI and RFI
signals can distort and corrupt the data signals being carried by copper media.
Crosstalk – Crosstalk is a disturbance caused by the electric or magnetic fields of a signal on one
wire interfering with the signal in an adjacent wire.
12. Refer to the graphic. What type of cabling is shown?
STP
UTP
coax
fiber
13. Which two devices commonly affect wireless networks? (Choose two.)
Blu-ray players
home theaters
cordless phones
microwaves
incandescent light bulbs
external hard drives
Explanation: Radio Frequency Interference (RFI) is the interference that is caused by radio transmitters
and other devices that are transmitting in the same frequency.
14. Which two statements describe the services provided by the data link layer? (Choose two.)
It defines the end-to-end delivery addressing scheme.
It maintains the path between the source and destination devices during the data transmission.
It manages the access of frames to the network media.
It provides reliable delivery through link establishment and flow control.
It ensures that application data will be transmitted according to the prioritization.
It packages various Layer 3 PDUs into a frame format that is compatible with the network
interface.
Explanation: The data link layer is divided into two sub layers, namely Logical Link Control (LLC) and
Media Access Control (MAC). LLC forms a frame from the network layer PDU into a format that
conforms to the requirements of the network interface and media. A network layer PDU might be for IPv4
or IPv6. The MAC sub layer defines the media access processes performed by the hardware. It manages
the frame access to the network media according to the physical signaling requirements (copper cable,
fiber optic, wireless, etc.)
15. What is the function of the CRC value that is found in the FCS field of a frame?
to verify the integrity of the received frame
to verify the physical address in the frame
to verify the logical address in the frame
to compute the checksum header for the data field in the frame
Explanation: The CRC value in the FCS field of the received frame is compared to the computed CRC
value of that frame, in order to verify the integrity of the frame. If the two values do not match, then the
frame is discarded.
16. What is contained in the trailer of a data-link frame?
logical address
physical address
data
error detection
Explanation: The trailer in a data-link frame contains error detection information that is pertinent to the
frame included in the FCS field. The header contains control information, such as the addressing, while
the area that is indicated by the word “data” includes the data, transport layer PDU, and the IP header.
17. Which statement describes a characteristic of the frame header fields of the data link layer?
They all include the flow control and logical connection fields.
Ethernet frame header fields contain Layer 3 source and destination addresses.
They vary depending on protocols.
They include information on user applications.
Explanation: All data link layer protocols encapsulate the Layer 3 PDU within the data field of the
frame. However, the structure of the frame and the fields that are contained in the header vary according
to the protocol. Different data link layer protocols may use different fields, like priority/quality of service,
logical connection control, physical link control, flow control, and congestion control.
18. A network team is comparing physical WAN topologies for connecting remote sites to a
headquarters building. Which topology provides high availability and connects some, but not all,
remote sites?
mesh
partial mesh
hub and spoke
point-to-point
Explanation: Partial mesh topologies provide high availability by interconnecting multiple remote sites,
but do not require a connection between all remote sites. A mesh topology requires point-to-point links
with every system being connected to every other system. A point-to-point topology is where each device
is connected to one other device. A hub and spoke uses a central device in a star topology that connects to
other point-to-point devices.
19. Which two fields or features does Ethernet examine to determine if a received frame is passed to
the data link layer or discarded by the NIC? (Choose two.)
auto-MDIX
CEF
Frame Check Sequence
minimum frame size
source MAC address
Explanation: An Ethernet frame is not processed and is discarded if it is smaller than the minimum (64
bytes) or if the calculated frame check sequence (FCS) value does not match the received FCS value.
Auto-MDIX (automatic medium-dependent interface crossover) is Layer 1 technology that detects cable
straight-through or crossover types. The source MAC address is not used to determine how the frame is
received. CEF (Cisco Express Forwarding) is a technology used to expedite Layer 3 switching.
20. Which media communication type does not require media arbitration in the data link layer?
deterministic
half-duplex
full-duplex
controlled access
Explanation: Half-duplex communication occurs when both devices can both transmit and receive on the
medium but cannot do so simultaneously. Full-duplex communication occurs when both devices can
transmit and receive on the medium at the same time and therefore does not require media arbitration.
Half-duplex communication is typically contention-based, whereas controlled (deterministic) access is
applied in technologies where devices take turns to access the medium.
21. Which statement describes an extended star topology?
End devices connect to a central intermediate device, which in turn connects to other
central intermediate devices.
End devices are connected together by a bus and each bus connects to a central intermediate
device.
Each end system is connected to its respective neighbor via an intermediate device.
All end and intermediate devices are connected in a chain to each other.
Explanation: In an extended star topology, central intermediate devices interconnect other star
topologies.
22. What is a characteristic of the LLC sublayer?
It provides the logical addressing required that identifies the device.
It provides delimitation of data according to the physical signaling requirements of the medium.
It places information in the frame allowing multiple Layer 3 protocols to use the same
network interface and media.
It defines software processes that provide services to the physical layer.
Explanation: The Logical Link Control (LLC) defines the software processes that provide services to the
network layer protocols. The information is placed by LLC in the frame and identifies which network
layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as
IPv4 and IPv6, to utilize the same network interface and media.
23. What are three ways that media access control is used in networking? (Choose three.)
Ethernet utilizes CSMA/CD.
Media access control provides placement of data frames onto the media.
Contention-based access is also known as deterministic.
802.11 utilizes CSMA/CD.
Data link layer protocols define the rules for access to different media.
Networks with controlled access have reduced performance due to data collisions.
Explanation: Wired Ethernet networks use CSMA/CD for media access control. IEEE 802.11 wireless
networks use CSMA/CA, a similar method. Media access control defines the way data frames get placed
on the media. The controlled access method is deterministic, not a contention-based access to networks.
Because each device has its own time to use the medium, controlled access networks such as legacy
Token Ring do not have collisions.
24. During the encapsulation process, what occurs at the data link layer for a PC connected to an
Ethernet network?
An IP address is added.
The logical address is added.
The physical address is added.
The process port number is added.
Explanation: The Ethernet frame includes the source and destination physical address. The trailer
includes a CRC value in the Frame Check Sequence field to allow the receiving device to determine if the
frame has been changed (has errors) during the transmission.
25. What three items are contained in an Ethernet header and trailer? (Choose three.)
source IP address
source MAC address
destination IP address
destination MAC address
error-checking information
Explanation: Layer 2 headers contain the following:
Frame start and stop indicator flags at the beginning and end of a frame
Addressing – for Ethernet networks this part of the header contains source and destination MAC
addresses
Type field to indicate what Layer 3 protocol is being used
Error detection to determine if the frame arrived without error
26. What type of communication rule would best describe CSMA/CD?
access method
flow control
message encapsulation
message encoding
Explanation: Carrier sense multiple access collision detection (CSMA/CD) is the access method used
with Ethernet. The access method rule of communication dictates how a network device is able to place a
signal on the carrier. CSMA/CD dictates those rules on an Ethernet network and CSMA/CA dictates those
rules on an 802.11 wireless LAN.
27. Which three basic parts are common to all frame types supported by the data link layer?
(Choose three.)
header
type field
MTU size
data
trailer
CRC value
Explanation: The data link protocol is responsible for NIC-to-NIC communications within the same
network. Although there are many different data link layer protocols that describe data link layer frames,
each frame type has three basic parts:
Header
Data
Trailer
28. Which statement is true about the CSMA/CD access method that is used in Ethernet?
When a device hears a carrier signal and transmits, a collision cannot occur.
A jamming signal causes only devices that caused the collision to execute a backoff algorithm.
All network devices must listen before transmitting.
Devices involved in a collision get priority to transmit after the backoff period.
Explanation: Legacy bus-topology Ethernet LAN uses CSMA/CD as network media access control
protocol. It works by detecting a collision in the medium and backing off (after transmitting a jam signal)
as necessary. When one host wants to transmit a frame, it listens on the medium to check if the medium is
busy. After it senses that no one else is transmitting, the host starts transmitting the frame, it also monitors
the current level to detect a collision. If it detects a collision, it transmits a special jam signal so that all
other hosts can know there was a collision. The other host will receive this jam signal and stop
transmitting. After this, both hosts enter an exponential backoff phase and retry transmission.
29. What is the auto-MDIX feature on a switch?
the automatic configuration of an interface for 10/100/1000 Mb/s operation
the automatic configuration of an interface for a straight-through or a crossover Ethernet
cable connection
the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable
the ability to turn a switch interface on or off accordingly if an active connection is detected
Explanation: The auto-MDIX enables a switch to use a crossover or a straight-through Ethernet cable to
connect to a device regardless of the device on the other end of the connection.
30. Refer to the exhibit. What is the destination MAC address of the Ethernet frame as it leaves the
web server if the final destination is PC1?
00-60-2F-3A-07-AA
00-60-2F-3A-07-BB
00-60-2F-3A-07-CC
00-60-2F-3A-07-DD
Explanation: The destination MAC address is used for local delivery of Ethernet frames. The MAC
(Layer 2) address changes at each network segment along the path. As the frame leaves the web server, it
will be delivered by using the MAC address of the default gateway.
31. A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port
connected to a 100Base-T network. Which method of memory buffering would work best for this
task?
port-based buffering
level 1 cache buffering
shared memory buffering
fixed configuration buffering
Explanation: With shared memory buffering, the number of frames stored in the buffer is restricted only
by the of the entire memory buffer and not limited to a single port buffer. This permits larger frames to be
transmitted with fewer dropped frames. This is important to asymmetric switching, which applies to this
scenario, where frames are being exchanged between ports of different rates. With port-based memory
buffering, frames are stored in queues that are linked to specific incoming and outgoing ports making it
possible for a single frame to delay the transmission of all the frames in memory because of a busy
destination port. Level 1 cache is memory used in a CPU. Fixed configuration refers to the port
arrangement in switch hardware.
32. What are two examples of the cut-through switching method? (Choose two.)
store-and-forward switching
fast-forward switching
CRC switching
fragment-free switching
QOS switching
Explanation: Store-and forward switching accepts the entire frame and performs error checking using
CRC before forwarding the frame. Store-and-forward is often required for QOS analysis. Fast-forward
and fragment-free are both variations of the cut-through switching method where only part of the frame is
received before the switch begins to forward it.
33. Which frame forwarding method receives the entire frame and performs a CRC check to detect
errors before forwarding the frame?
cut-through switching
store-and-forward switching
fragment-free switching
fast-forward switching
Explanation: Fast-forward and fragment-free switching are variations of cut-through switching, which
begins to forward the frame before the entire frame is received.
34. What is the purpose of the FCS field in a frame?
to obtain the MAC address of the sending node
to verify the logical address of the sending node
to compute the CRC header for the data field
to determine if errors occurred in the transmission and reception
Explanation: The FCS field in a frame is used to detect any errors in the transmission and receipt of a
frame. This is done by comparing the CRC value within the frame against a computed CRC value of the
frame. If the two values do not match, then the frame is discarded.
35. Which switching method has the lowest level of latency?
cut-through
store-and-forward
fragment-free
fast-forward
Explanation: Fast-forward switching begins to forward a frame after reading the destination MAC
address, resulting in the lowest latency. Fragment-free reads the first 64 bytes before forwarding. Store-
and-forward has the highest latency because it reads the entire frame before beginning to forward it. Both
fragment-free and fast-forward are types of cut-through switching.
36. A network administrator is connecting two modern switches using a straight-through cable. The
switches are new and have never been configured. Which three statements are correct about the
final result of the connection? (Choose three.)
The link between the switches will work at the fastest speed that is supported by both
switches.
The link between switches will work as full-duplex.
If both switches support different speeds, they will each work at their own fastest speed.
The auto-MDIX feature will configure the interfaces eliminating the need for a crossover
cable.
The connection will not be possible unless the administrator changes the cable to a crossover
cable.
The duplex capability has to be manually configured because it cannot be negotiated.
Explanation: Modern switches can negotiate to work in full-duplex mode if both switches are capable.
They will negotiate to work using the fastest possible speed and the auto-MDIX feature is enabled by
default, so a cable change is not needed.
37. Which advantage does the store-and-forward switching method have compared with the cut-
through switching method?
collision detecting
frame error checking
faster frame forwarding
frame forwarding using IPv4 Layer 3 and 4 information
Explanation: A switch using the store-and-forward switching method performs an error check on an
incoming frame by comparing the FCS value against its own FCS calculations after the entire frame is
received. In comparison, a switch using the cut-through switching method makes quick forwarding
decisions and starts the forwarding process without waiting for the entire frame to be received. Thus a
switch using cut-through switching may send invalid frames to the network. The performance of store-
and-forward switching is slower compared to cut-through switching performance. Collision detection is
monitored by the sending device. Store-and-forward switching does not use IPv4 Layer 3 and 4
information for its forwarding decisions.
38. When the store-and-forward method of switching is in use, what part of the Ethernet frame is
used to perform an error check?
CRC in the trailer
source MAC address in the header
destination MAC address in the header
protocol type in the header
Explanation: The cyclic redundancy check (CRC) part of the trailer is used to determine if the frame has
been modified during transit. If the integrity of the frame is verified, the frame is forwarded. If the
integrity of the frame cannot be verified, then the frame is dropped.
43. What is one advantage of using the cut-through switching method instead of the store-and-
forward switching method?
has a positive impact on bandwidth by dropping most of the invalid frames
makes a fast forwarding decision based on the source MAC address of the frame
has a lower latency appropriate for high-performance computing applications
provides the flexibility to support any mix of Ethernet speeds
Explanation: Cut-through switching provides lower latency switching for high-performance computing
(HPC) applications. Cut-through switching allows more invalid frames to cross the network than store-
and-forward switching. The cut-through switching method can make a forwarding decision as soon as it
looks up the destination MAC address of the frame.
44. Which is a multicast MAC address?
FF-FF-FF-FF-FF-FF
5C-26-0A-4B-19-3E
01-00-5E-00-00-03
00-26-0F-4B-00-3E
Explanation: Multicast MAC addresses begin with the special value of 01-00-5E.
45. Refer to the exhibit. What is wrong with the displayed termination?
Which port does Switch0 use to send frames to the host with the IPv4 address 10.1.1.5?
Fa0/1
Fa0/5
Fa0/9
Fa0/11
Explanation: Issuing the command ipconfig /all from the PC0 command prompt displays the IPv4
address and MAC address. When the IPv4 address 10.1.1.5 is pinged from PC0, the switch stores the
source MAC address (from PC0) along with the port to which PC0 is connected. When the destination
reply is received, the switch takes the destination MAC address and compares to MAC addresses stored in
the MAC address table. Issuing the show mac-address-table on the PC0 Terminal application displays
two dynamic MAC address entries. The MAC address and port entry that does not belong to PC0 must be
the MAC address and port of the destination with the IPv4 address 10.1.1.5.
48. What does the term “attenuation” mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
Explanation: Data is transmitted on copper cables as electrical pulses. A detector in the network interface
of a destination device must receive a signal that can be successfully decoded to match the signal sent.
However, the farther the signal travels, the more it deteriorates. This is referred to as signal attenuation.
49. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)
greater distances per cable run
lower installation cost
limited susceptibility to EMI/RFI
durable connections
greater bandwidth potential
easily terminated
Explanation: Optical fiber cable transmits data over longer distances and at higher bandwidths than any
other networking media. Unlike copper wires, fiber-optic cable can transmit signals with less attenuation
and is completely immune to EMI and RFI.
50. What OSI physical layer term describes the process by which one wave modifies another wave?
modulation
IEEE
EIA/TIA
air
51. What OSI physical layer term describes the capacity at which a medium can carry data?
bandwidth
IEEE
EIA/TIA
air
53. What OSI physical layer term describes the measure of the transfer of bits across a medium
over a given period of time?
throughput
bandwidth
latency
goodput
54. What OSI physical layer term describes the amount of time, including delays, for data to travel
from one point to another?
latency
bandwidth
throughput
goodput
55. What OSI physical layer term describes the amount of time, including delays, for data to travel
from one point to another?
latency
fiber-optic cable
air
copper cable
56. What OSI physical layer term describes the measure of usable data transferred over a given
period of time?
goodput
fiber-optic cable
air
copper cable
57. What OSI physical layer term describes the physical medium which uses electrical pulses?
copper cable
fiber-optic cable
air
goodput
58. What OSI physical layer term describes the physical medium that uses the propagation of light?
fiber-optic cable
goodput
latency
throughput
59. What OSI physical layer term describes the physical medium for microwave transmissions?
air
goodput
latency
throughput
60. Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose
two.)
Adds Layer 2 control information to network protocol data.
Places information in the frame that identifies which network layer protocol is being used for the
frame.
Controls the NIC responsible for sending and receiving data on the physical medium.
Implements a trailer to detect transmission errors.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Case 2:
Provides synchronization between source and target nodes.
Integrates various physical technologies.
Communicates between the networking software at the upper layers and the device hardware at
the lower layers.
Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Case 3:
Enables IPv4 and IPv6 to utilize the same network interface and media.
Provides synchronization between source and target nodes.
Implements a trailer to detect transmission errors.
Adds Layer 2 control information to network protocol data.
Places information in the frame that identifies which network layer protocol is being used for the
frame.
Case 4:
Enables IPv4 and IPv6 to utilize the same network interface and media.
Adds Layer 2 control information to network protocol data.
Integrates various physical technologies.
Communicates between the networking software at the upper layers and the device hardware at
the lower layers.
Provides synchronization between source and target nodes.
Case 5:
Places information in the frame that identifies which network layer protocol is being used for the
frame.
Integrates various physical technologies.
Adds Layer 2 control information to network protocol data.
Controls the NIC responsible for sending and receiving data on the physical medium.
Communicates between the networking software at the upper layers and the device hardware at
the lower layers.
Case 6:
Controls the NIC responsible for sending and receiving data on the physical medium
Provides a mechanism to allow multiple devices to communicate over a shared medium.
61. Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose
two.)
Enables IPv4 and IPv6 to utilize the same network interface and media.
Places information in the frame that identifies which network layer protocol is being used
for the frame.
Integrates various physical technologies.
Implements a process to delimit fields within a Layer 2 frame.
Controls the NIC responsible for sending and receiving data on the physical medium.
64. Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose
two.)
Adds Layer 2 control information to network protocol data.
Places information in the frame that identifies which network layer protocol is being used
for the frame.
Performs data encapsulation.
Controls the NIC responsible for sending and receiving data on the physical medium.
Integrates various physical technologies.
66. Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose
two.)
Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Provides data link layer addressing.
Implements a trailer to detect transmission errors.
Provides synchronization between source and target nodes.
68. Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose
two.)
Enables IPv4 and IPv6 to utilize the same network interface and media.
Adds Layer 2 control information to network protocol data.
Integrates various physical technologies.
Implements a trailer to detect transmission errors.
Provides synchronization between source and target nodes.
71. What action will occur if a switch receives a frame with the destination MAC address
FF:FF:FF:FF:FF:FF?
The switch forwards it out all ports except the ingress port.
The switch shares the MAC address table entry with any connected switches.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC address is not
local.
73. What action will occur if a switch receives a frame with the destination MAC address
01:00:5E:00:00:D9?
The switch forwards it out all ports except the ingress port.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC address is not
local.
The switch shares the MAC address table entry with any connected switches.
74. What action will occur if a host receives a frame with a destination MAC address of
FF:FF:FF:FF:FF:FF?
The host will process the frame.
The host forwards the frame to the router.
The host sends the frame to the switch to update the MAC address table.
The host forwards the frame to all other hosts.
75. What action will occur if a switch receives a frame and does have the source MAC address in
the MAC table?
The switch refreshes the timer on that entry.
The switch adds it to its MAC address table associated with the port number.
The switch forwards the frame to the associated port.
The switch sends the frame to a connected router because the destination MAC address is not
local.
76. What action will occur if a host receives a frame with a destination MAC address of
FF:FF:FF:FF:FF:FF?
The host will process the frame.
The host returns the frame to the switch.
The host replies to the switch with its own IP address.
The host forwards the frame to all other hosts.
78. What action will occur if a host receives a frame with a destination MAC address it does not
recognize?
The host will discard the frame.
The host replies to the switch with its own IP address.
The host forwards the frame to all other hosts.
The host returns the frame to the switch.
79. Which type of UTP cable is used to connect a PC to a switch port?
console
rollover
crossover
straight-through
Explanation: A rollover cable is a Cisco proprietary cable used to connect to a router or switch console
port. A straight-through (also called patch) cable is usually used to interconnect a host to a switch and a
switch to a router. A crossover cable is used to interconnect similar devices together, for example,
between two switches, two routers, and two hosts.
1. Which information is used by routers to forward a data packet toward its destination?
source IP address
destination IP address
source data-link address
destination data-link address
2. A computer has to send a packet to a destination host in the same LAN. How will the packet be
sent?
The packet will be sent to the default gateway first, and then, depending on the response from the
gateway, it may be sent to the destination host.
The packet will be sent directly to the destination host.
The packet will first be sent to the default gateway, and then from the default gateway it will be
sent directly to the destination host.
The packet will be sent only to the default gateway.
3. A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to
be forwarded out the Gigabit 0/1 interface. What will the router do next?
route the packet out the Gigabit 0/1 interface
create a new Layer 2 Ethernet frame to be sent to the destination
look into the ARP cache to determine the destination IP address
look into the routing table to determine if the destination network is in the routing table
4. Which IPv4 address can a host use to ping the loopback interface?
126.0.0.1
127.0.0.0
126.0.0.0
127.0.0.1
5. A computer can access devices on the same network but cannot access devices on other networks.
What is the probable cause of this problem?
The cable is not connected properly to the NIC.
The computer has an invalid IP address.
The computer has an incorrect subnet mask.
The computer has an invalid default gateway address.
6. Which statement describes a feature of the IP protocol?
IP encapsulation is modified based on network media.
IP relies on Layer 2 protocols for transmission error control.
MAC addresses are used during the IP packet encapsulation.
IP relies on upper layer services to handle situations of missing or out-of-order packets.
Explanation: IP protocol is a connection-less protocol, considered unreliable in terms of end-to-end
delivery. It does not provide error control in the cases where receiving packets are out-of-order or in cases
of missing packets. It relies on upper layer services, such as TCP, to resolve these issues.
7. Why is NAT not needed in IPv6?
Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal
networks.
Any host or user can get a public IPv6 network address because the number of available
IPv6 addresses is extremely large.
The problems that are induced by NAT applications are solved because the IPv6 header improves
packet handling by intermediate routers.
The end-to-end connectivity problems that are caused by NAT are solved because the number of
routes increases with the number of nodes that are connected to the Internet.
Explanation: The large number of public IPv6 addresses eliminates the need for NAT. Sites from the
largest enterprises to single households can get public IPv6 network addresses. This avoids some of the
NAT-induced application problems that are experienced by applications that require end-to-end
connectivity.
8. Which parameter does the router use to choose the path to the destination when there are
multiple routes available?
the lower metric value that is associated with the destination network
the lower gateway IP address to get to the destination network
the higher metric value that is associated with the destination network
the higher gateway IP address to get to the destination network
9. What are two services provided by the OSI network layer? (Choose two.)
performing error detection
routing packets toward the destination
encapsulating PDUs from the transport layer
placement of frames on the media
collision detection
Explanation: The OSI network layer provides several services to allow communication between devices:
addressing
encapsulation
routing
de-encapsulation
Error detection, placing frames on the media, and collision detection are all functions of the data ink
layer.
10. Within a production network, what is the purpose of configuring a switch with a default
gateway address?
Hosts that are connected to the switch can use the switch default gateway address to forward
packets to a remote destination.
A switch must have a default gateway to be accessible by Telnet and SSH.
The default gateway address is used to forward packets originating from the switch to
remote networks.
It provides a next-hop address for all traffic that flows through the switch.
Explanation: A default gateway address allows a switch to forward packets that originate on the switch
to remote networks. A default gateway address on a switch does not provide Layer 3 routing for PCs that
are connected on that switch. A switch can still be accessible from Telnet as long as the source of the
Telnet connection is on the local network.
11. What is a basic characteristic of the IP protocol?
connectionless
media dependent
user data segmentation
reliable end-to-end delivery
Explanation: Internet Protocol (IP) is a network layer protocol that does not require initial exchange of
control information to establish an end-to-end connection before packets are forwarded. Thus, IP is
connectionless and does not provide reliable end-to-end delivery by itself. IP is media independent. User
data segmentation is a service provided at the transport layer.
12. Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?
Time-to-Live
Sequence Number
Acknowledgment Number
Differentiated Services
Explanation: The value of the Time-to-Live (TTL) field in the IPv4 header is used to limit the lifetime of
a packet. The sending host sets the initial TTL value; which is decreased by one each time the packet is
processed by a router. If the TTL field decrements to zero, the router discards the packet and sends an
Internet Control Message Protocol (ICMP) Time Exceeded message to the source IP address. The
Differentiated Services (DS) field is used to determine the priority of each packet. Sequence Number and
Acknowledgment Number are two fields in the TCP header.
13. What is one advantage that the IPv6 simplified header offers over IPv4?
smaller-sized header
little requirement for processing checksums
smaller-sized source and destination IP addresses
efficient packet handling
Explanation: The IPv6 simplified header offers several advantages over IPv4:
Better routing efficiency and efficient packet handling for performance and forwarding-rate
scalability
No requirement for processing checksums
Simplified and more efficient extension header mechanisms (as opposed to the IPv4 Options
field)
A Flow Label field for per-flow processing with no need to open the transport inner packet to
identify the various traffic flows
14. What IPv4 header field identifies the upper layer protocol carried in the packet?
Protocol
Identification
Version
Differentiated Services
Explanation: It is the Protocol field in the IP header that identifies the upper-layer protocol the packet is
carrying. The Version field identifies the IP version. The Differential Services field is used for setting
packet priority. The Identification field is used to reorder fragmented packets.
15. Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces
on the router. (Not all targets are used.)
Explanation: Packets with a destination of 172.17.6.15 are forwarded through Fa0/0. Packets with a
destination of 172.17.10.5 are forwarded through Fa1/1. Packets with a destination of 172.17.12.10 are
forwarded through Fa1/0. Packets with a destination of 172.17.14.8 are forwarded through Fa0/1.
Because network 172.17.8.0 has no entry in the routing table, it will take the gateway of last resort, which
means that packets with a destination of 172.17.8.20 are forwarded through Serial0/0/0. Because a
gateway of last resort exists, no packets will be dropped.
16. What information does the loopback test provide?
The TCP/IP stack on the device is working correctly.
The device has end-to-end connectivity.
DHCP is working correctly.
The Ethernet cable is working correctly.
The device has the correct IP address on the network.
Explanation: Because the loopback test sends packets back to the host device, it does not provide
information about network connectivity to other hosts. The loopback test verifies that the host NIC,
drivers, and TCP/IP stack are functioning.
17. What routing table entry has a next hop address associated with a destination network?
directly-connected routes
local routes
remote routes
C and L source routes
Explanation: Routing table entries for remote routes will have a next hop IP address. The next hop IP
address is the address of the router interface of the next device to be used to reach the destination
network. Directly-connected and local routes have no next hop, because they do not require going through
another router to be reached.
18. How do hosts ensure that their packets are directed to the correct network destination?
They have to keep their own local routing table that contains a route to the loopback
interface, a local network route, and a remote default route.
They always direct their packets to the default gateway, which will be responsible for the packet
delivery.
They search in their own local routing table for a route to the network destination address and
pass this information to the default gateway.
They send a query packet to the default gateway asking for the best route.
Explanation: Hosts must maintain their own local routing table to ensure that network layer packets are
directed to the correct destination network. This local table typically contains a route to the loopback
interface, a route to the network that the host is connected to, and a local default route, which represents
the route that packets must take to reach all remote network addresses.
19. When transporting data from real-time applications, such as streaming audio and video, which
field in the IPv6 header can be used to inform the routers and switches to maintain the same path
for the packets in the same conversation?
Next Header
Flow Label
Traffic Class
Differentiated Services
Explanation: The Flow Label in IPv6 header is a 20-bit field that provides a special service for real-time
applications. This field can be used to inform routers and switches to maintain the same path for the
packet flow so that packets will not be reordered.
20. What statement describes the function of the Address Resolution Protocol?
ARP is used to discover the IP address of any host on a different network.
ARP is used to discover the IP address of any host on the local network.
ARP is used to discover the MAC address of any host on a different network.
ARP is used to discover the MAC address of any host on the local network.
Explanation: When a PC wants to send data on the network, it always knows the IP address of the
destination. However, it also needs to discover the MAC address of the destination. ARP is the protocol
that is used to discover the MAC address of a host that belongs to the same network.
21. Under which two circumstances will a switch flood a frame out of every port except the port
that the frame was received on? (Choose two.)
The frame has the broadcast address as the destination address.
The destination address is unknown to the switch.
The source address in the frame header is the broadcast address.
The source address in the frame is a multicast address.
The destination address in the frame is a known unicast address.
Explanation: A switch will flood a frame out of every port, except the one that the frame was received
from, under two circumstances. Either the frame has the broadcast address as the destination address, or
the destination address is unknown to the switch.
22. Which statement describes the treatment of ARP requests on the local link?
They must be forwarded by all routers on the local network.
They are received and processed by every device on the local network.
They are dropped by all switches on the local network.
They are received and processed only by the target device.
Explanation: One of the negative issues with ARP requests is that they are sent as a broadcast. This
means all devices on the local link must receive and process the request.
23. Which destination address is used in an ARP request frame?
0.0.0.0
255.255.255.255
FFFF.FFFF.FFFF
AAAA.AAAA.AAAA
the physical address of the destination host
Explanation: The purpose of an ARP request is to find the MAC address of the destination host on an
Ethernet LAN. The ARP process sends a Layer 2 broadcast to all devices on the Ethernet LAN. The frame
contains the IP address of the destination and the broadcast MAC address, FFFF.FFFF.FFFF. The host
with the IP address that matches the IP address in the ARP request will reply with a unicast frame that
includes the MAC address of the host. Thus the original sending host will obtain the destination IP and
MAC address pair to continue the encapsulation process for data transmission.
24. A network technician issues the arp -d * command on a PC after the router that is connected to
the LAN is reconfigured. What is the result after this command is issued?
The ARP cache is cleared.
The current content of the ARP cache is displayed.
The detailed information of the ARP cache is displayed.
The ARP cache is synchronized with the router interface.
Explanation: Issuing the arp –d * command on a PC will clear the ARP cache content. This is helpful
when a network technician wants to ensure the cache is populated with updated information.
25. Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC
address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with
the frame?
32. A new network administrator has been asked to enter a banner message on a Cisco device. What
is the fastest way a network administrator could test whether the banner is properly configured?
Reboot the device.
Enter CTRL-Z at the privileged mode prompt.
Exit global configuration mode.
Power cycle the device.
Exit privileged EXEC mode and press Enter.
Explanation: While at the privileged mode prompt such as Router#, type exit,press Enter, and the
banner message appears. Power cycling a network device that has had the banner motd command issued
will also display the banner message, but this is not a quick way to test the configuration.
33. A network administrator requires access to manage routers and switches locally and remotely.
Match the description to the access method. (Not all options are used.)
Explanation: Both the console and AUX ports can be used to directly connect to a Cisco network device
for management purposes. However, it is more common to use the console port. The AUX port is more
often used for remote access via a dial up connection. SSH and Telnet are both remote access methods
that depend on an active network connection. SSH uses a stronger password authentication than Telnet
uses and also uses encryption on transmitted data.
34. Match the phases to the functions during the boot up process of a Cisco router. (Not all options
are used.)
Explanation: There are three major phases to the bootup process of a Cisco router:
1. Perform the POST and load the bootstrap program.
2. Locate and load the Cisco IOS software.
3. Locate and load the startup configuration file
If a startup configuration file cannot be located, the router will enter setup mode by displaying the setup
mode prompt.
35. Match the command with the device mode at which the command is entered. (Not all options
are used.)
Explanation: The enable command is entered in R1> mode. The login command is entered in
R1(config-line)# mode. The copy running-config startup-config command is entered in R1# mode.
The ip address 192.168.4.4 255.255.255.0 command is entered in R1(config-if)# mode. The service
password-encryption command is entered in global configuration mode.
36. What are two functions of NVRAM? (Choose two.)
to store the routing table
to retain contents when power is removed
to store the startup configuration file
to contain the running configuration file
to store the ARP table
Explanation: NVRAM is permanent memory storage, so the startup configuration file is preserved even
if the router loses power.
37. A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
The configuration file is missing from NVRAM.
The POST process has detected hardware failure.
Explanation: If a router cannot locate the startup-config file in NVRAM, it will enter setup mode to
allow the configuration to be entered from the console device.
38. The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What
is the effect of this command?
The switch will have a management interface with the address 172.16.100.1.
The switch can be remotely managed from a host on another network.
The switch can communicate with other hosts on the 172.16.100.0 network.
The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.
Explanation: A default gateway address is typically configured on all devices to allow them to
communicate beyond just their local network.In a switch this is achieved using the command ip default-
gateway <ip address>.
39. What happens when the transport input ssh command is entered on the switch vty lines?
The SSH client on the switch is enabled.
Communication between the switch and remote users is encrypted.
The switch requires a username/password combination for remote access.
The switch requires remote connections via a proprietary client software.
Explanation: The transport input ssh command when entered on the switch vty (virtual terminal lines)
will encrypt all inbound controlled telnet connections.
40. Refer to the exhibit. A user PC has successfully transmitted packets to www.cisco.com. Which IP
address does the user PC target in order to forward its data off the local network?
172.24.255.17
172.24.1.22
172.20.0.254
172.24.255.4
172.20.1.18
41. Match the configuration mode with the command that is available in that mode. (Not all options
are used.)
Explanation: The enable command is entered at the R1> prompt. The login command is entered at the
R1(config-line)# prompt. The copy running-config startup-config command is entered at the R1#
prompt. The interface fastethernet 0/0 command is entered at the R1(config)# prompt.
42. Which three commands are used to set up secure access to a router through a connection to the
console interface? (Choose three.)
interface fastethernet 0/0
line vty 0 4
line console 0
enable secret cisco
login
password cisco
Explanation: The three commands needed to password protect the console port are as follows:
line console 0
password cisco
login
The interface fastethernet 0/0 command is commonly used to access the configuration mode used to
apply specific parameters such as the IP address to the Fa0/0 port. The line vty 0 4 command is used to
access the configuration mode for Telnet. The0and 4 parameters specify ports 0 through 4, or a maximum
of five simultaneous Telnet connections. The enable secret command is used to apply a password used on
the router to access the privileged mode.
43. Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a
description of the default gateway address?
It is the IP address of the Router1 interface that connects the company to the Internet.
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the ISP network device located in the cloud.
Explanation: The default gateway is used to route packets destined for remote networks. The default
gateway IP address is the address of the first Layer 3 device (the router interface) that connects to the
same network.
44. Which two functions are primary functions of a router? (Choose two.)
packet forwarding
microsegmentation
domain name resolution
path selection
flow control
Explanation: A router accepts a packet and accesses its routing table to determine the appropriate exit
interface based on the destination address. The router then forwards the packet out of that interface.
45. What is the effect of using the Router# copy running-config startup-config command on a
router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
Explanation: The command copy running-config startup-config copies the running-configuration file
from RAM into NVRAM and saves it as the startup-configuration file. Since NVRAM is none-volatile
memory it will be able to retain the configuration details when the router is powered off.
46. What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.
Explanation: When a host needs to send a message to another host located on the same network, it can
forward the message directly. However, when a host needs to send a message to a remote network, it must
use the router, also known as the default gateway. This is because the data link frame address of the
remote destination host cannot be used directly. Instead, the IP packet has to be sent to the router (default
gateway) and the router will forward the packet toward its destination. Therefore, if the default gateway is
incorrectly configured, the host can communicate with other hosts on the same network, but not with
hosts on remote networks.
47. What are two potential network problems that can result from ARP operation? (Choose two.)
Manually configuring static ARP associations could facilitate ARP poisoning or MAC address
spoofing.
On large networks with low bandwidth, multiple ARP broadcasts could cause data
communication delays.
Network attackers could manipulate MAC address and IP address mappings in ARP
messages with the intent of intercepting network traffic.
Large numbers of ARP request broadcasts could cause the host MAC address table to overflow
and prevent the host from communicating on the network.
Multiple ARP replies result in the switch MAC address table containing entries that match the
MAC addresses of hosts that are connected to the relevant switch port.
Explanation: Large numbers of ARP broadcast messages could cause momentary data communications
delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages
with the intent to intercept network traffic. ARP requests and replies cause entries to be made into the
ARP table, not the MAC address table. ARP table overflows are very unlikely. Manually configuring
static ARP associations is a way to prevent, not facilitate, ARP poisoning and MAC address spoofing.
Multiple ARP replies resulting in the switch MAC address table containing entries that match the MAC
addresses of connected nodes and are associated with the relevant switch port are required for normal
switch frame forwarding operations. It is not an ARP caused network problem.
48. Open the PT activity. Perform the tasks in the activity instructions and then answer the
question.
CCNA 1 v7 Modules 8 – 10 Communicating Between Networks Exam
Modules 8 - 10 Communicating Between Networks Packet Tracer file 235.82 KB 7580 downloads
...
Download