CCNA Introduction to Networks Chapter 5

Ace your homework & exams now with Quizwiz!

The binary number 0000 1010 can be expressed as __________ in hexadecimal.

A (Remember 8 4 2 1)

What is a characteristic of a contention-based access method? A. It is a nondeterministic method. B. It scales very well under heavy media use. C. It processes more overhead than the controlled access methods do. D. It has mechanisms to track the turns to access the media.

A. It is a nondeterministic method.

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address? A. It will send an ARP request for the MAC address of the default gateway. B. It will send the frame and use its own MAC address as the destination. C. It will send the frame with a broadcast MAC address. D. It will send a request to the DNS server for the destination MAC a dress. E. It will send an ARP request for the MAC address of the destination device.

A. It will send an ARP request for the MAC address of the default gateway.

What are two potential network problems that can result from ARP operation? (Choose two.) A. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. B. Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port. C. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. D. Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing. E. Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network.

A. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. C. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.

A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task? A. shared memory buffering B. fixed configuration buffering C. port-based buffering D. level 1 cache buffering

A. shared memory buffering

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.) A. A packet that has crossed four routers has changed the destination IP address four times. B. Destination IP addresses in a packet header remain constant along the entire path to a target host. C. Destination MAC addresses will never change in a frame that goes across seven routers. D. Every time a frame is encapsulated with a new destination MAC address, a new destination IP address is needed. E. Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another.

B. Destination IP addresses in a packet header remain constant along the entire path to a target host. E. Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another.

How does adding an Ethernet line card affect the form factor of a switch? A. by increasing the back plane switching speed B. by expanding the port density C. by expanding the NVRAM capacity D. by making the switch stackable

B. by expanding the port density

Which two statements describe a fixed configuration Ethernet switch? (Choose two.) A. An SVI cannot be configured on the switch. B. The switch cannot be configured with multiple VLANs. C. The port density of the switch is determined by the Cisco IOS. D. A fixed configuration switch may be stackable. E. The number of ports on the switch cannot be increased.

D. A fixed configuration switch may be stackable. E. The number of ports on the switch cannot be increased.

Which statement is true about MAC addresses? A. A NIC only needs a MAC address if connected to a WAN. B. MAC addresses are implemented by software. C. The ISO is responsible for MAC addresses regulations. D. The first three bytes are used by the vendor assigned OUI.

D. The first three bytes are used by the vendor assigned OUI.

A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection? (Choose three.) A. The link between switches will work as full-duplex. B. If both switches support different speeds, they will each work at their own fastest speed. C. The link between the switches will work at the fastest speed that is supported by both switches. D. The duplex capability has to be manually configured because it cannot be negotiated. E. The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable. F. The connection will not be possible unless the administrator changes the cable to a crossover cable.

A. The link between switches will work as full-duplex. C. The link between the switches will work at the fastest speed that is supported by both switches. E. The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.

Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.) A. The LLC sublayer is responsible for the placement and retrieval of frames on and off the media. B. The data link layer uses LLC to communicate with the upper layers of the protocol suite. C. Logical link control is specified in the IEEE 802.3 standard. D. The LLC sublayer interacts directly with the NIC driver software. E. Logical link control is implemented in software.

B. The data link layer uses LLC to communicate with the upper layers of the protocol suite. E. Logical link control is implemented in software.

What is the Layer 2 multicast MAC address that corresponds to the Layer 3 IPv4 multicast address 224.139.34.56? A. FE-80-00-0B-22-38 B. 00-00-00-0B-22-38 C. 01-00-5E-0B-22-38 D. 01-5E-00-0B-22-38 E. FF-FF-FF-0B-22-38

C. 01-00-5E-0B-22-38

What statement illustrates a drawback of the CSMA/CD access method? A. It is more complex than non-deterministic protocols. B. CSMA/CD LAN technologies are only available at slower speeds than other LAN technologies. C. Collisions can decrease network performance. D. Deterministic media access protocols slow network performance.

C. Collisions can decrease network performance.

What are two features of ARP? (Choose two.) A. An ARP request is sent to all devices on the Ethernet LAN and contains the IP address of the destination host and its multicast MAC address. B. When a host is encapsulating a packet into a frame, it refers to the MAC address table to determine the mapping of IP addresses to MAC addresses. C. If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply. D. If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. E. If no device responds to the ARP request, then the originating node will broadcast the data packet to all devices on the network segment.

C. If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply. D. If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.

Which address or combination of addresses does a Layer 3 switch use to make forwarding decisions? A. MAC address only B. IP address only C. MAC and IP addresses D. port address only E. MAC and port addresses

C. MAC and IP addresses

A network administrator issues the following commands on a Layer 3 switch: DLS1(config)# interface f0/3 DLS1(config-if)# no switchport DLS1(config-if)# ip address 172.16.0.1 255.255.255.0 DLS1(config-if)# no shutdown DLS1(config-if)# end What is the administrator configuring? A. a trunk interface B. a Cisco Express Forwarding instance C. a routed port D. a switched virtual interface

C. a routed port

What is the purpose of the preamble in an Ethernet frame? A. is used as a padding for data B. is used to identify the destination address C. is used for timing synchronization D. is used to identify the source address

C. is used for timing synchronization

When would a switch record multiple entries for a single switch port in its MAC address table? A. when multiple ARP broadcasts have been forwarded B. when a router is connected to the switch port C. when the switch is configured for Layer 3 switching D. when another switch is connected to the switch port

D. when another switch is connected to the switch port

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?​ A. SW1 will send an ARP reply with the PC2 MAC address.​ B. SW1 will send an ARP reply with its Fa0/1 MAC address.​ C. RT1 will send an ARP reply with the PC2 MAC address.​ D. RT1 will send an ARP reply with its Fa0/0 MAC address.​ E. PC2 will send an ARP reply with its MAC address.

E. PC2 will send an ARP reply with its MAC address.

Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame? A. The switch will forward the frame only to port 2. B. The switch will discard the frame. C. The switch will forward the frame to all ports. D. The switch will forward the frame only to ports 1 and 3. E. The switch will forward the frame to all ports except port 4.

E. The switch will forward the frame to all ports except port 4.


Related study sets

Chapter 5. Analyzing the Marketing Environment

View Set

Promotion and Advertising / Chapter 22

View Set

Aggression & Violence Chapter 25

View Set