CCNA CHAPTER 4-6

Ace your homework & exams now with Quizwiz!

What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)

-64 bytes -1518 bytes

Which two pieces of information are in the RAM of a Cisco router during normal operation? (Choose two.)

-Cisco IOS -IP routing table

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

-EMI -RFI

What are two services performed by the data link layer of the OSI model? (Choose two.)

-It accepts Layer 3 packets and encapsulates them into frames. -It provides media access control and performs detection.

Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)

-Logical link control is implemented in software. -The data link layer uses LLC to communicate with the upper layers of the protocol suite.

What are two potential network problems that can result from ARP operation? (Choose two.)

-Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. -On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays

What are two types of router interfaces? (Choose two).

-WAN -LAN

What are two characteristics of IP? (Choose two.)

-does not require a dedicated end-to-end connection -operates independently of the network media

What are two examples of hybrid topologies? (Choose two.)

-full mesh -point-to-point

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.

-interference -security -coverage area

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

-line console 0 -password cisco -login

What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)

-to distinguish data bits from control bits -to identify where the frame starts and ends

Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?

1 - rollover, 2 - straight-through, 3 - crossover

What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?

64 bytes

Which statement describes an extended star topology?

End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.

Which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF

What is a characteristic of port-based memory buffering?

Frames are buffered in queues linked to specific ports.

Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?

Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

What statement describes Ethernet?

It defines the most common LAN type in the world.

Which statements describes a hardware feature of a Cisco 1941 router that has the default hardware configuration?

It has two types of ports that can be used to access the console.

What is one advantage of using fiber optic cabling rather than copper cabling?

It is able to carry signals much farther than copper cabling

What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?

LLC

The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address

Following default settings, what is the next step in the router boot sequence after the IOS loads from flash?

Locate and load the startup-config file from NVRAM

What is true concerning physical and logical topologies?

Logical topologies refer to how a network transfers data between devices.

Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit?

Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?

PC2 will send an ARP reply with its MAC address.

What IPv4 header field identifies the upper layer protocol carried in the packet?

Protocol

Match the command with the device mode at which the command is entered. copy running-config startup-config

R1#

Match the command with the device mode at which the command is entered. service password-encryption

R1(config)#

Match the command with the device mode at which the command is entered. ip address 192.168.4.4 255.255.255.0

R1(config-if)#

Match the command with the device mode at which the command is entered. login

R1(config-line)#

Match the command with the device mode at which the command is entered. enable

R1>

Which type of connector does a network interface card use?

RJ-45

A collision fragment, also known as a ____________ frame, is a frame of fewer than 64 bytes in length.

RUNT

Open the PT Activity. The enable password on all devices is cisco. Perform the tasks in the activity instructions and then answer the question. For what reason is the failure occurring?

SW1 does not have a default gateway configured.

Refer to the exhibit. R1 receives a packet destined for the IP address 192.168.2.10. Out which interface will R1 forward the packet?

Serial0/0/1

Which characteristic describes an IPv6 enhancement over IPv4?

The IPv6 header is simpler than the IPv4 header is, which improves packet handling.

A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM

Which statement is true about MAC addresses?

The first three bytes are used by the vendor assigned OUI.

What happens to runt frames received by a Cisco Ethernet switch?

The frame is dropped.

Refer to the exhibit. Which route from the PC1 routing table will be used to reach PC2?

The graphic contains a table that has five columns. The column headings and values are as follows. The column one heading is Network Destination and the value is 192.168.10.0. The column two heading is Netmask and the value is 255.255.255.0. The column three heading is Gateway and the value is On-link. The column four heading is Interface and the value is 192.168.10.10. The column five heading is Metric and the value is 281.

Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?

The switch will forward the frame to all ports except port 4.

As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?

The transmitting node inserts start and stop bits into the frame.

Refer to the exhibit. What is wrong with the displayed termination?

The untwisted length of each wire too long

Why are two strands of fiber used for a single fiber optic connection?

They allow for full-duplex connectivity

Which statement describes the treatment of ARP requests on the local link?

They are received and processed by every device on the local network.

What statement describes a characteristic of MAC addresses?

They must be globally unique.

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?

Time-to-Live

True or False? When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway.

True

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

What is auto-MDIX?

a feature that detects Ethernet cable type

The term __________ indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).

bandwidth

begins forwarding when the destination address is received

cut-through

has low latency

cut-through

may forward runt frames

cut-through

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

data link

What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?

directly connected route

What is one advantage that the IPv6 simplified header offers over IPv4?

efficient packet handling

What is contained in the trailer of a data-link frame?

error detection

Which method of data transfer allows information to be sent and received at the same time?

full duplex

A physical topology that is a variation or combination of a point-to-point, hub and spoke, or mesh topology is commonly known as a ______________ topology.

hybrid

LED as a light source

multimode fiber

generally used with LANs

multimode fiber

several paths of light into the fiber

multimode fiber

Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?

only hosts B, C, and router R1

On a Cisco switch, __________ memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports.

port-based

What routing table entry has a next hop address associated with a destination network?

remote routes

generally used for campus backbone

single-mode fiber

laser as light source

single-mode fiber

only one ray of light into the fiber

single-mode fiber

ARP _______ is a technique that is used to send fake ARP messages to other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses.

spoofing

Which switching method uses the CRC value in a frame?

store-and-forward

always stores the entire frame

store-and-forward

checks the CRC before forwarding

store-and-forward

checks the frame length before forwarding

store-and-forward

Which characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications among many hosts?

the ability to operate without regard to the data that is carried in each packet

What is the definition of bandwidth?

the amount of data that can flow from one place to another in a given amount of time

Which characteristic describes crosstalk?

the distortion of the transmitted messages from signals carried in adjacent wires

What is indicated by the term throughput?

the measure of the bits transferred across the media over a given period of time

What addressing information is recorded by a switch to build its MAC address table?

the source Layer 2 address of incoming frames

What is the aim of an ARP spoofing attack?

to associate IP addresses to the wrong MAC address

What is the purpose of the startup configuration file on a Cisco router?

to contain the commands that are used to initially configure a router on startup

What is a role of the Logical Link Control sublayer?

to mark frames to identify the network layer protocol being carried

What is the function of the CRC value that is found in the FCS field of a frame?

to verify the integrity of the received frame

What technique is used with UTP cable to help protect against signal interference from crosstalk?

twisting the wires together into pairs


Related study sets

practice questions for exam 2 psy 360

View Set

MGT 371 ch9: Building effective teams and teamwork

View Set

Business Law - Chapter 18 (Performance and Breach of Sales and Lease Contracts)

View Set