CCNA Practice Test #1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What method is used to manage contention-based access on a wireless network? CSMA/CD priority ordering CSMA/CA token passing

CSMA/CA Explain: Carrier sense multiple access with collision avoidance (CSMA/CA) is used with wireless networking technology to mediate media contention. Carrier sense multiple access with collision detection (CSMA/CD) is used with wired Ethernet technology to mediate media contention. Priority ordering and token passing are not used (or not a method) for media access control.

Which range of link-local addresses can be assigned to an IPv6-enabled interface? FEC0::/10 FDEE::/7 FE80::/10 FF00::/8

FE80::/10 Explain: Link-local addresses are in the range of FE80::/10 to FEBF::/10. The original IPv6 specification defined site-local addresses and used the prefix range FEC0::/10, but these addresses were deprecated by the IETF in favor of unique local addresses. FDEE::/7 is a unique local address because it is in the range of FC00::/7 to FDFF::/7. IPv6 multicast addresses have the prefix FF00::/8.

What is the purpose of the command ping ::1? It tests the internal configuration of an IPv6 host. It tests the broadcast capability of all hosts on the subnet. It tests the multicast connectivity to all hosts on the subnet. It tests the reachability of the default gateway for the network.

It tests the internal configuration of an IPv6 host. Explain: The address ::1 is an IPv6 loopback address. Using the command ping ::1 tests the internal IP stack to ensure that it is configured and functioning correctly. It does not test reachability to any external device, nor does it confirm that IPv6 addresses are properly configured on the host.

5. What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server? TCP IP HTTP Ethernet

TCP Explain: TCP is a Layer 4 protocol of the OSI model. TCP has several responsibilities in the network communication process. It divides large messages into smaller segments which are more efficient to send across the network. It also controls the size and rate of segments exchanged between clients and servers.

4. On which switch interface would an administrator configure an IP address so that the switch can be managed remotely? FastEthernet0/1 VLAN 1 vty 0 console 0

VLAN 1 Explain: Interface VLAN 1 is a virtual interface on a switch, called SVI (switch virtual interface). Configuring an IP address on the default SVI, interface VLAN 1, will allow a switch to be accessed remotely. The VTY line must also be configured to allow remote access, but an IP address cannot be configured on this line.

What is a characteristic of UTP cabling? cancellation cladding immunity to electrical hazards woven copper braid or metallic foil

cancellation Explain: Cladding and immunization from electrical hazards are characteristics for fiber-optic cabling. A woven copper braid or metallic foil is used as a shield for the inner coaxial cable conductor. Cancellation is a property of UTP cabling where two wires are located adjacent to one another so each magnetic field cancels out the adjacent magnetic field.

Which two tasks are functions of the presentation layer? (Choose two.) compression addressing encryption session control authentication

compression encryption Explain: The presentation layer deals with common data format. Encryption, formatting, and compression are some of the functions of the layer. Addressing occurs in the network layer, session control occurs in the session layer, and authentication takes place in the application or session layer.

If a device receives an Ethernet frame of 60 bytes, what will it do? drop the frame process the frame as it is send an error message to the sending device add random data bytes to make it 64 bytes long and then forward it

drop the frame Explain: Ethernet standards define the minimum frame size as 64 bytes. A frame less than 64 bytes is considered a "collision fragment" or "runt frame" and is automatically discarded by receiving devices.

What are two examples of the cut-through switching method? (Choose two.) store-and-forward switching fast-forward switching CRC switching fragment-free switching QOS switching

fast-forward switching fragment-free switching Explain:Store-and forward switching accepts the entire frame and performs error checking using CRC before forwarding the frame. Store-and-forward is often required for QOS analysis. Fast-forward and fragment-free are both variations of the cut-through switching method where only part of the frame is received before the switch begins to forward it.

7.) Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.) data link network physical session transport

network , transport The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. The OSI session layer (with the presentation layer) is included within the TCP/IP application layer.

When planning for network growth, where in the network should packet captures take place to assess network traffic? on as many different network segments as possible only at the edge of the network between hosts and the default gateway only on the busiest network segment

on as many different network segments as possible Explain: Because some types of traffic will be only on specific network segments, packet captures for analysis should be performed on as many segments as possible.

8.) Which name is assigned to the transport layer PDU? bits data frame packet segment

segment Application data is passed down the protocol stack on its way to be transmitted across the network media. During the process, various protocols add information to it at each level. At each stage of the process, a PDU (protocol data unit) has a different name to reflect its new functions. The PDUs are named according to the protocols of the TCP/IP suite: Data - The general term for the PDU used at the application layer.Segment - transport layer PDUPacket - network layer PDUFrame - data link layer PDUBits - A physical layer PDU used when physically transmitting data over the medium

What is the process of dividing a data stream into smaller pieces before transmission? segmentation encapsulation encoding flow control

segmentation Explain: Data streams would cause significant network congestion if they were transmitted as a single large stream of bits. To increase efficiency, data streams are segmented into smaller more manageable pieces which are then transmitted over the network.

What are two ways that TCP uses the sequence numbers in a segment? (Choose two.) to identify missing segments at the destination to reassemble the segments at the remote location to specify the order in which the segments travel from source to destination to limit the number of segments that can be sent out of an interface at one time to determine if the packet changed during transit

to identify missing segments at the destination to reassemble the segments at the remote location

3. An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes? to restart the ping process to interrupt the ping process to exit to a different configuration mode to allow the user to complete the command

to interrupt the ping process

What is one difference between the client-server and peer-to-peer network models? Only in the client-server model can file transfers occur. Every device in a peer-to-peer network can function as a client or a server. A peer-to-peer network transfers data faster than a transfer using a client-server network. A data transfer that uses a device serving in a client role requires that a dedicated server be present.

Every device in a peer-to-peer network can function as a client or a server. Explain:Data transfer speeds depend on a number of factors including the amount of traffic, the quality of service imposed, and the network media. Transfer speeds are not dependent on the network model type. File transfers can occur using the client-server model or the peer-to-peer model. A data transfer between a device acting in the client role and a device acting in the server role can occur in both peer-to-peer and client-server networks.

What are two services provided by the OSI network layer? (Choose two.) performing error detection routing packets toward the destination encapsulating PDUs from the transport layer placement of frames on the media collision detection

Explain: The OSI network layer provides several services to allow communication between devices: addressing encapsulation routing de-encapsulation Error detection, placing frames on the media, and collision detection are all functions of the Data Link layer.

6.) What are two benefits of using a layered network model? (Choose two.) It assists in protocol design. It speeds up packet delivery. It prevents designers from creating their own model. It prevents technology in one layer from affecting other layers. It ensures a device at one layer can function at the next higher layer.

It assists in protocol design. It prevents technology in one layer from affecting other layers. Some vendors have developed their own reference models and protocols. Today, if a device is to communicate on the Internet, the device must use the TCP/IP model. The benefits of using a layered model are as follows: assists in protocol design fosters competition between vendors prevents a technology that functions at one layer from affecting any other layer provides a common language for describing network functionality helps in visualizing the interaction between each layer and protocols between each layer

What are two characteristics of fiber-optic cable? (Choose two.) It is not affected by EMI or RFI. Each pair of cables is wrapped in metallic foil. It combines the technique of cancellation, shielding, and twisting to protect data. It typically contains 4 pairs of fiber-optic wires. It is more expensive than UTP cabling is.

It is not affected by EMI or RFI. It is more expensive than UTP cabling is. Explain: Fiber-optic cabling supports higher bandwidth than UTP for longer distances. Fiber is immune to EMI and RFI, but costs more, requires more skill to install, and requires more safety precautions.

What is a characteristic of the LLC sublayer? It provides the logical addressing required that identifies the device. It provides delimitation of data according to the physical signaling requirements of the medium. It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media. It defines software processes that provide services to the physical layer.

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media. Explain:The Logical Link Control (LLC) defines the software processes that provide services to the network layer protocols. The information is placed by LLC in the frame and identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media.

. What is a characteristic of a fault tolerant network? a network that protects confidential information from unauthorized access a network that can expand quickly to support new users and applications without impacting the performance of the service delivered to existing users a network that supports a mechanism for managing congestion and ensuring reliable delivery of content to all users a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure

a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure Explain:Fault tolerant networks limit the impact of a failure because the networks are built in a way that allows for quick recovery when such a failure occurs. These networks depend on multiple or redundant paths between the source and destination of a message.A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.Quality of service (QoS) is a mechanism for managing congestion and ensuring reliable delivery of content to all users.

2. Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types? financial transactions, audio conference, web page audio conference, financial transactions, web page audio conference, web page, financial transactions financial transactions, web page, audio conference

audio conference, financial transactions, web page Explain: QoS mechanisms enable the establishment of queue management strategies that enforce priorities for different categories of application data. Thus, this queuing enables voice data to have priority over transaction data, which has priority over web data.

What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.) error correction through a collision detection method session control using port numbers data link layer addressing placement and removal of frames from the media detection of errors through CRC calculations delimiting groups of bits into frames conversion of bits into data signals

data link layer addressing detection of errors through CRC calculations delimiting groups of bits into frames Explain: Through the framing process, delimiters are used to identify the start and end of the sequence of bits that make up a frame. Data link layer addressing is added to enable a frame to be delivered to a destination node. A cyclic redundancy check (CRC) field is calculated on every bit and added to the frame. If the CRC value contained in the arriving frame is the same as the one the receiving node creates, the frame will be processed.

What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device? timing and synchronization destination and source port numbers destination and source physical addresses destination and source logical network addresses

destination and source port numbers Explain:The destination and source port numbers are used to identify exactly which protocol and process is requesting or responding to a request.

A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.) the amount of traffic that is currently crossing the network the sophistication of the encapsulation method applied to the data the type of traffic that is crossing the network the latency created by the number of devices that the data is crossing the bandwidth of the WAN connection to the Internet the reliability of the gigabit Ethernet infrastructure of the backbone

the amount of traffic that is currently crossing the network the type of traffic that is crossing the network the latency created by the number of devices that the data is crossing Explain: Throughput usually does not match the specified bandwidth of physical links due to multiple factors. These factors include, the amount of traffic, type of traffic, and latency created by the network devices the data has to cross.


Set pelajaran terkait

Government/Nonprofit Final Study Guide

View Set

CH.5 The Nurse as Manager of Care

View Set

Horizontal and Vertical Straight line graphs

View Set

Robotics and Automation Questions- Skills USA TECHNOLOGY-verF

View Set