ICND1 100-105 (2)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Answer: A,F

A network administrator is connecting PC hosts A and B directly through their Ethernet interfaces as shown in the graphic. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? (Choose two.) A. A crossover cable should be used in place of the straight-through cable. B. A rollover cable should be used in place of the straight-through cable. C. The subnet masks should be set to 255.255.255.192 D. A default gateway needs to be set on each host. E. The hosts must be reconfigured to use private IP addresses for direct connections of this type. F. The subnet masks should be set to 255.255.255.0

To what type of port would a cable with a DB-60 connector attach? A. Serial port B. Console port C. Ethernet port D. Fibre optic port

Answer: A

Which two characteristics apply to Layer 2 switches? (Choose two.) A. Increases the number of collision domains B. Decreases the number of collision domains C. Implements VLAN D. Decreases the number of broadcast domains E. Uses the IP address to make decisions for forwarding data packets

Answer: A,C Explanation: Layer 2 switches offer a number of benefits to hubs, such as the use of VLANs and each switch port is in its own separate collision domain, thus eliminating collisions on the segment.

Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet? (Choose three.) A. 10.1.168.0 B. 10.1.176.1 C. 10.1.174.255 D. 10.1.160.255 E. 10.1.160.0 F. 10.1.175.255

Answer: A,C,D Explanation: Explanation/Reference: All IP address in IP ranges between: 10.1.160.1 and 10.1.175.254 are valid as shown below Address: 10.1.160.0 00001010.00000001.1010 0000.00000000 Netmask: 255.255.240.0 = 20 11111111.11111111.1111 0000.00000000 Wildcard: 0.0.15.255 00000000.00000000.0000 1111.11111111 Which implies that: Network: 10.1.160.0/20 00001010.00000001.1010 0000.00000000 HostMin: 10.1.160.1 00001010.00000001.1010 0000.00000001 HostMax: 10.1.175.254 00001010.00000001.1010 1111.11111110 Broadcast: 10.1.175.255 00001010.00000001.1010 1111.11111111

Which of the following are types of flow control? (Choose three.) A. buffering B. cut-through C. windowing D. congestion avoidance E. load balancing

Answer: A,C,D Explanation: Explanation/Reference: http://www.info-it.net/cisco/ccna/exam-tips/flow-control.php During Transfer of data, a high speed computer is generating data traffic a lot faster than the network device can handle in transferring to destination, so single gateway or destination device cannot handle much amount of traffic that is called "Congestion". Buffering - The technique is used to control the data transfer when we have congestion, when a network device receive a data it stores in memory section and then transfer to next destination this process called "Buffering". Windowing Whereas Windowing is used for flow control by the Transport layer. Say the sender device is sending segments and the receiver device can accommodate only a fixed number of segments before it can accept more, the two devices negotiate the window size during the connection setup. This is done so that the sending device doesn't overflow the receiving device's buffer. Also the receiving device can send a single acknowledgement for the segments it has received instead of sending an acknowledgement after every segment received. Also, this window size is dynamic meaning, the devices can negotiate and change the window size in the middle of a session. So if initially the window size is three and the receiving device thinks that it can accept more number of segments in its buffer it can negotiate with the sending device and it increase it to say 5 for example. Windowing is used only by TCP since UDP doesn't use or allow flow control.

A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)? A. 4, 48 B. 48, 4 C. 48, 1 D. 1, 48 E. 4, 1

Answer: B Explanation: A switch uses a separate collision domain for each port, and each VLAN is a separate broadcast domain.

A switch receives a frame on one of its ports. There is no entry in the MAC address table for the destination MAC address. What will the switch do with the frame? A. drop the frame B. forward it out of all ports except the one that received it C. forward it out of all ports D. store it until it learns the correct port

Answer: B Explanation: Understanding this concept is prime for understanding that when switch receives the data frame from the host not having the MAC address already in the MAC table, it will add the MAC address to the source port on the MAC address table and sends the data frame. If the switch already has the MAC address in it's table for the destination, it will forward the frame directly to the destination port. If it was not already in it's MAC table, then they frame would have been flooded out all ports except for the port that it came from.

Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets? A. 1 B. 2 C. 4 D. 8 E. 252 F. 254

Answer: B Explanation: Explanation/Reference: /30 CIDR corresponds to mask 55.255.255.252 whose binary is 11111100 which means 6 subnet bits and 2 host bits which means 62 subnets and 2 hosts per subnet.

Which one of the following IP addresses is the last valid host in the subnet using mask 255.255.255.224? A. 192.168.2.63 B. 192.168.2.62 C. 192.168.2.61 D. 192.168.2.60 E. 192.168.2.32

Answer: B Explanation: Explanation/Reference: With the 224 there are 8 networks with increments of 32 One of these is 32 33 62 63 where 63 is broadcast so 62 is last valid host out of given choices.

Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choose two.) A. a bridge B. a router C. a hub D. a Layer 3 switch E. an access point

Answer: B,D Explanation: Routers and layer 3 switches will not propagate broadcast traffic beyond the local segment, so the use of these devices is the best method for eliminating broadcast storms.

Which two statements describe the IP address 10.16.3.65/23? (Choose two.) A. The subnet address is 10.16.3.0 255.255.254.0. B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0. C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0 D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0. E. The network is not subnetted.

Answer: B,D Explanation: Explanation/Reference: The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.) A. layer 3 support B. port security C. redundant components D. VLANs E. PoE

Answer: B,D Explanation: http://www.ciscopath.com/content/61/ http://www.mcmcse.com/cisco/guides/hierarchical_model.shtml Access layer The main purpose of the access layer is to provide direct connection to devices on the network and controlling which devices are allowed to communicate over it. The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points (AP). Switch features in the Access layer:

What is the subnet address for the IP address 172.19.20.23/28? A. 172.19.20.0 B. 172.19.20.15 C. 172.19.20.16 D. 172.19.20.20 E. 172.19.20.32

Answer: C

Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address? A. 192.168.1.8/29 B. 192.168.1.32/27 C. 192.168.1.40/29 D. 192.168.1.16/28 E. 192.168.1.48/29

Answer: C Explanation: Explanation/Reference: 248 mask uses 5 bits (1111 1000) 42 IP in binary is (0010 1010) The base subnet therefore is the lowest binary value that can be written without changing the output of an AND operation of the subnet mask and IP... 1111 1000 AND 0010 1010 equals 0010 1000 - which is .40 /24 is standard class C mask. Adding the 5 bits from the .248 mask gives /29

What is the subnet address of 172.16.159.159/22? A. 172.16.0.0 B. 172.16.128.0 C. 172.16.156.0 D. 172.16.159.0 E. 172.16.159.128 F. 172.16.192.0

Answer: C Explanation: Explanation/Reference: Converting to binary format it comes to 11111111.11111111.11111100.00000000 or 255.255.252.0 Starting with 172.16.0.0 and having increment of 4 we get.

What is the purpose of flow control? A. To ensure data is retransmitted if an acknowledgement is not received. B. To reassemble segments in the correct order at the destination device. C. To provide a means for the receiver to govern the amount of data sent by the sender. D. To regulate the size of each segment.

Answer: C Explanation: Explanation/Reference: http://whatis.techtarget.com/definition/flow-control Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace. Too much data arriving before a device can handle it causes data overflow, meaning the data is either lost or must be retransmitted. For serial data transmission locally or in a network, the Xon/Xoff protocol can be used. For modem connections, either Xon/Xoff or CTS/RTS (Clear to Send/Ready to Send) commands can be used to control data flow. In a network, flow control can also be applied by refusing additional device connections until the flow of traffic has subsided.

An administrator is working with the 192.168.4.0 network, which has been subnetted with a /26 mask. Which two addresses can be assigned to hosts within the same subnet? (Choose two.) A. 192.168.4.61 B. 192.168.4.63 C. 192.168.4.67 D. 192.168.4.125 E. 192.168.4.128 F. 192.168.4.132

Answer: C,D Explanation: Only the values of host with 67 and 125 fall within the range of /26 CIDR subnet mask, all others lie beyond it.

What does a host on an Ethernet network do when it is creating a frame and it does not have the destination address? A. Drops the frame B. Sends out a Layer 3 broadcast message C. Sends a message to the router requesting the address D. Sends out an ARP request with the destination IP address

Answer: D Explanation: In this case, it will send out an ARP request for MAC address of the destination IP (assuming it doesn't already have it in its table) and then address it to the destination's MAC address.

How many simultaneous Telnet sessions does a Cisco router support by default? A. 1 B. 2 C. 3 D. 4 E. 5 F. 6

Answer: E

Which address type does a switch use to make selective forwarding decisions? A. Source IP address B. Destination IP address C. Source and destination IP address D. Source MAC address E. Destination MAC address

Answer: E Explanation: Switches analyze the destination MAC to make its forwarding decision since it is a layer 2 device. Routers use the destination IP address to make forwarding decisions.

Answer: E Explanation: A switch uses a separate collision domain for each port so there are a total of 9 for each device shown. In addition to this, the switch to switch connections (3) are a separate collision domain. Finally, we add the switch to router connections (2) and the router to router connection (1) for a total of 15.

Refer to the exhibit. All devices attached to the network are shown. How many collision domains are present in this network? A. 2 B. 3 C. 6 D. 9 E. 15

Answer: B Explanation: Explanation/Reference: Hubs create single collision and broadcast domains.

Refer to the exhibit. How many collision domains are shown? A. one B. two C. three D. four E. six F.twelve

Answer: B,D Explanation: If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from.

Refer to the exhibit. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. What two operations will the switch perform when it receives this frame? (Choose two.) A. The switch will not forward a frame with this destination MAC address. B. The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table. C. The MAC address of ffff.ffff.ffff will be added to the MAC address table. D. The frame will be forwarded out all active switch ports except for port fa0/0. E. The frame will be forwarded out fa0/0 and fa0/1 only. F. The frame will be forwarded out all the ports on the switch.

Answer: A Explanation: Subnet mask A i.e. 255.255.255.192 with CIDR of /26 which means 64 hosts per subnet which are sufficient to accommodate even the largest subnet of 50 hosts.

Refer to the exhibit. The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248 E. 255.255.255.252

Answer: D Explanation: Explanation/Reference: Subnet mask 255.255.255.224 with CIDR of /27 which results in 32 hosts per. 192.168.1.31 is the broadcast address for subnet '0' 192.168.1.64 is the network address for subnet '2' 192.168.1.127 is the broadcast address for subnet '3' 192.168.1.192 is the network address for subnet '6'

Refer to the exhibit. The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 255.255.255.224. The routing protocol in use is RIP version 1. Which address could be assigned to the FastEthernet interface on RouterA? A. 192.168.1.31 B. 192.168.1.64 C. 192.168.1.127 D. 192.168.1.190 E. 192.168.1.192

Answer: D

Refer to the exhibit. The output is from a router in a large enterprise. From the output, determine the role of the router. A. A Core router. B. The HQ Internet gateway router. C. The WAN router at the central site. D. Remote stub router at a remote site.

Answer: A,D Explanation: Explanation/Reference: If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. It will also add the MAC address of the source device to its MAC address table

Refer to the exhibit. The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. What two operations will the switch perform when it receives this frame? (Choose two.) A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table. B. The MAC address of 0000.00dd.dddd will be added to the MAC address table. C. The frame will be forwarded out port fa0/3 only. D. The frame will be forwarded out fa0/1, fa0/2, and fa0/3. E. The frame will be forwarded out all the active ports.

Answer: A,D Explanation: Explanation/Reference: The source and destination addresses are on the same network therefore, a default gateway is not necessary for communication between these two addresses.

Refer to the exhibit. What two things can the technician determine by successfully pinging from this computer to the IP address 172.16.236.1? (Choose two) A. The network card on the computer is functioning correctly. B. The default static route on the gateway router is correctly configured. C. The correct default gateway IP address is configured on the computer. D. The device with the IP address 172.16.236.1 is reachable over the network. E. The default gateway at 172.16.236.1 is able to forward packets to the internet.

Answer: B

Refer to the exhibit. What kind of cable should be used to make each connection that is identified by the numbers shown? A. 1 - Ethernet Crossover cable 2 - Ethernet straight-through cable 3 - Fiber Optic cable 4 - Rollover cable B. 1 - Ethernet straight-through cable 2 - Ethernet straight-through cable 3 - Serial cable 4 - Rollover cable C. 1 - Ethernet rollover cable 2 - Ethernet crossover cable 3 - Serial cable 4 - Null-modem cable D. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Rollover cable E. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Ethernet Straight-through cable

Answer: B

Refer to the topology and switching table shown in the graphic. Host B sends a frame to Host C. What will the switch do with the frame? A. Drop the frame B. Send the frame out all ports except port 0/2 C. Return the frame to Host B D. Send an ARP request for Host C E. Send an ICMP Host Unreachable message to Host B F. Record the destination MAC address in the switching table and send the frame directly to Host C


Set pelajaran terkait

Two World Wars and Attempts at Peace

View Set

Partial derivatives: Chapter 14.3

View Set

Skeletal Muscle Structural Terms

View Set

Molecular Biology Recommended End-of-Chapter Problems

View Set

Money Market Debt / Structured Products

View Set

MKT 300 Chapter One: Overview of Marketing

View Set

Section 16: Real Estate Financing: Mortgage Loans Unit 1

View Set