Introduction To Networks Version 70 ITNv7 Practice Final Exam Answers
Introduction To Networks Version 70 ITNv7 Practice Final Exam Answers
2. Refer to the exhibit. What does the value of the window size specify?
the amount of data that can be sent at one time
the amount of data that can be sent before an acknowledgment is required
the total number of bits received during this TCP session
a random number that is used in establishing a connection with
the 3-way handshake
7. Match the descriptions to the terms. (Not all options are used.)
8. What happens when a switch receives a frame and the calculated CRC value is
different than the value that is in the FCS field?
The switch notifies the source of the bad frame.
The switch places the new CRC value in the FCS field and
forwards the frame.
The switch drops the frame.
The switch floods the frame to all ports except the port through
which the frame arrived to notify the hosts of the error.
9. Two network engineers are discussing the methods used to forward frames
through a switch. What is an important concept related to the cut-through method
of switching?
The fragment-free switching offers the lowest level of latency.
Fast-forward switching can be viewed as a compromise
between store-and-forward switching and fragment-free
switching.
Fragment-free switching is the typical cut-through method of
switching.
Packets can be relayed with errors when fast-forward switching is used.
10. Which two issues can cause both runts and giants in Ethernet networks?
(Choose two.)
using the incorrect cable type
half-duplex operations
a malfunctioning NIC
electrical interference on serial interfaces
CRC errors
11. Which two functions are performed at the LLC sublayer of the
OSI Data Link Layer to facilitate Ethernet communication?
(Choose two.)
Other case
responsible for internal structure of Ethernet frame
applies source and destination MAC addresses to Ethernet
frame
integrates Layer 2 flows between 10 Gigabit Ethernet over fiber
and 1 Gigabit Ethernet over copper
enables IPv4 and IPv6 to utilize the same physical medium
handles communication between upper layer networking software and Ethernet
NIC hardware
Other case
adds Ethernet control information to network protocol data
responsible for internal structure of Ethernet frame
implements trailer with frame check sequence for error
detection
enables IPv4 and IPv6 to utilize the same physical medium
applies source and destination MAC addresses to Ethernet
frame
Other case
implements CSMA/CD over legacy shared half-duplex media
adds Ethernet control information to network protocol data
places information in the Ethernet frame that identifies which network layer
protocol is being encapsulated by the frame
applies source and destination MAC addresses to Ethernet
frame
integrates Layer 2 flows between 10 Gigabit Ethernet over fiber
and 1 Gigabit Ethernet over copper
12. Which two commands could be used to check if DNS name resolution is working
properly on a Windows PC? (Choose two.)
nslookup cisco.com
ping cisco.com
ipconfig /flushdns
net cisco.com
nbtstat cisco.com
Explanation: The ping command tests the connection between two
hosts. When ping uses a host domain name to test the
connection, the resolver on the PC will first perform the name
resolution to query the DNS server for the IP address of the host.
If the ping command is unable to resolve the domain name to an
IP address, an error will result.
13. A small advertising company has a web server that provides critical business
service. The company connects to the Internet through a leased line service to an
ISP. Which approach best provides cost effective redundancy for the Internet
connection?
Add a second NIC to the web server.
Add a connection to the Internet via a DSL line to another ISP.
Add another web server to prepare failover support.
Add multiple connections between the switches and the edge
router.
14. Only employees connected to IPv6 interfaces are having difficulty connecting to
remote networks. The analyst wants to verify that IPv6 routing has been enabled.
What is the best command to use to accomplish the task?
copy running-config startup-config
show interfaces
show ip nat translations
show running-config
15. Refer to the exhibit. A network administrator is connecting a new host to the
Registrar LAN. The host needs to communicate with remote networks. What IP
address would be configured as the default gateway on the new host?
Floor(config)# interface gi0/1
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# end
192.168.235.234
203.0.113.3
192.168.235.1
10.234.235.254
192.168.234.114
16. Match the command with the device mode at which the command is entered.
(Not all options are used.)
Explanation: The enable command is entered in R1> mode. The
login command is entered in R1(config-line)# mode. The copy
running-config startup-config command is entered in R1# mode.
The ip address 192.168.4.4 255.255.255.0 command is entered in
R1(config-if)# mode. The service password-encryption command
is entered in global configuration mode.
17. A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
The configuration file is missing from NVRAM.
The POST process has detected hardware failure.
Retrieves email from the server by downloading the email to the local mail
application of the client.
An application that allows real-time chatting among remote
users.
Allows remote access to network devices and servers.
Uses encryption to provide secure remote access to network
devices and servers.
19. Two students are working on a network design project. One student is doing the
drawing, while the other student is writing the proposal. The drawing is finished
and the student wants to share the folder that contains the drawing so that the other
student can access the file and copy it to a USB drive. Which networking model is
being used?
peer-to-peer
client-based
master-slave
point-to-point
tracert
ipconfig /displaydns
nslookup
net
22. Which two OSI model layers have the same functionality as
two layers of the TCP/IP model? (Choose two.)
data link
network
physical
session
transport
presentation
physical
network
data link
transport
application
session
Explanation:
The TCP/IP model consists of four layers: application, transport,
internet, and network access. The OSI model consists of seven
layers: application, presentation, session, transport, network,
data link, and physical. The top three layers of the OSI model:
application, presentation, and session map to the application
layer of the TCP/IP model.
25. Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose
two.)
neighbor solicitation
router advertisement
router solicitation
protocol unreachable
route redirection
26. A network technician types the command ping 127.0.0.1 at the command prompt
on a computer. What is the technician trying to accomplish?
pinging a host computer that has the IP address 127.0.0.1 on
the network
tracing the path to a host computer on the network and the
network has the IP address 127.0.0.1
checking the IP address on the network card
testing the integrity of the TCP/IP stack on the local machine
29. Which two acronyms represent the data link sublayers that Ethernet relies upon
to operate? (Choose two.)
SFD
LLC
CSMA
MAC
FCS
255.255.192.0
255.255.224.0
255.255.255.192
255.255.255.248
255.255.255.252
Explanation:
With an IPv4 network, the subnet mask is determined by the
hosts bits that are required:
11 host bits required – 255.255.248.0
10 host bits required – 255.255.252.0
9 host bits required – 255.255.254.0
8 host bits required – 255.255.255.0
7 host bits required – 255.255.255.128
6 host bits required – 255.255.255.192
5 host bits required – 255.255.255.224
4 host bits required – 255.255.255.240
3 host bits required – 255.255.255.248
2 host bits required – 255.255.255.252
32. Three devices are on three different subnets. Match the network address and the
broadcast address with each subnet where these devices are located. (Not all options
are used.)
link-local
public
loopback
multicast
37. Which term describes a field in the IPv4 packet header that
contains a unicast, multicast, or broadcast address?
38. If the default gateway is configured incorrectly on the host, what is the impact
on communications?
There is no impact on communications.
The host is unable to communicate on the local network.
The host can communicate with other hosts on the local network, but is unable to
communicate with hosts on remote networks.
The host can communicate with other hosts on remote
networks, but is unable to communicate with hosts on the local
network.
40. Refer to the exhibit. A user issues the command netstat –r on a workstation.
Which IPv6 address is one of the link-local addresses of the workstation?
::1/128
fe80::30d0:115:3f57:fe4c/128
fe80::/64
2001:0:9d38:6ab8:30d0:115:3f57:fe4c/128
43. Which two devices would be described as intermediary devices? (Choose two.)
wireless LAN controller
server
assembly line robots
IPS
gaming console
retail scanner
45. Refer to the exhibit. The exhibit shows a small switched network and the
contents of the MAC address table of the switch. PC1 has sent a frame addressed to
PC3. What will the switch do with the frame?
0.0.0.0
255.255.255.255
the physical address of the destination host
FFFF.FFFF.FFFF
AAAA.AAAA.AAAA
Explanation:
The purpose of an ARP request is to find the MAC address of the
destination host on an Ethernet LAN. The ARP process sends a
Layer 2 broadcast to all devices on the Ethernet LAN. The frame
contains the IP address of the destination and the broadcast
MAC address, FFFF.FFFF.FFFF. The host with the IP address that
matches the IP address in the ARP request will reply with a
unicast frame that includes the MAC address of the host. Thus
the original sending host will obtain the destination IP and MAC
address pair to continue the encapsulation process for data
transmission.
47. Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet
to PC3. In this scenario, what will happen next?
SW1 will send an ARP reply with its Fa0/1 MAC address.
RT1 will send an ARP reply with its own Fa0/0 MAC address.
RT1 will forward the ARP request to PC3.
RT1 will send an ARP reply with the PC3 MAC address.
RT1 will send an ARP reply with its own Fa0/1 MAC address.
48. A network administrator is issuing the login block-for 180 attempts 2 within 30
command on a router. Which threat is the network administrator trying to prevent?
a user who is trying to guess a password to access the router
a worm that is attempting to access another part of the
network
an unidentified individual who is trying to access the network
equipment room
a device that is trying to inspect the traffic on a link
50. What are two ways to protect a computer from malware? (Choose two.)
Empty the browser cache.
Use antivirus software.
Delete unused software.
Keep software up to date.
Defragment the hard disk.
access
Trojan horse
reconnaissance
DoS
53. What OSI physical layer term describes the measure of the transfer of bits
across a medium over a given period of time?
latency
goodput
throughput
bandwidth
54. Refer to the exhibit. What is the maximum possible throughput between the PC
and the server?
10 Mb/s
1000 Mb/s
128 kb/s
100 Mb/s
55. Match the description with the media. (Not all options are
used.)
Ex
planation: UTP cables are used in wired office environments.
Coaxial cables are used to connect cable modems and
televisions. Fiber optics are used for high transmission speeds
and to transfer data over long distances. STP cables are used in
environments where there is a lot of interference.