Questions Book CCNA

Ace your homework & exams now with Quizwiz!

A client issues a DNS request to its local DNS server. The local DNS server does not have the information required. Which entity will send a DNS response to the client?

A client issues a DNS request to its local DNS server. The local DNS server does not have the information required. Which entity will send a DNS response to the client? the client's local DNS server

A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two.) A. input errors B. frame C. giants D. CRC E. runts

A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two.) A. input errors B. frame C. giants D. CRC E. runts Correct Answer: AD Whenever the physical transmission has problems, the receiving device might receive a frame whose bits have changed values. These frames do not pass the error detection logic as implemented in the FCS field in the Ethernet trailer. The receiving device discards the frame and counts it as some kind of input error. Cisco switches list this error as a CRC error. Cyclic redundancy check (CRC) is a term related to how the FCS math detects an error. The input errors includes runts, giants, no buffer, CRC, frame, overrun, and ignored counts. See PIC for example: The output below show the interface counters with the show interface s0/0/0 command:

Characteristics of poorly designed networks. (4)

Characteristics of poorly designed networks. (4) - large broadcast domains - management and support difficulties - possible security vulnerabilities - failure domains

checksum (define)

Checksums are used to verify that data are not erroneously modified in transit.

CWND

Congestion Window (CWND) is a TCP state variable that limits the amount of data the TCP can send into the network before receiving an ACK.

Consider the following: Sliding windows used with TCP, when is the window size established ?

Consider the following: Sliding windows used with TCP, when is the window size established ? The window size which is a buffer, is established and agreed upon by the sender and receiver during the three-way handshake.

Three-Tier Hierarchical Network Design

Core Layer - layer 3 high speed connectivity to our data center and applications within the environment. Distribution Layer - Layer 2 is for communication between components. Access Layer Layer - Layer 1 is where your devices hook into the network.

DRAG DROP -Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right. Select and Place

Correct Answer: This subnet question requires us to grasp how to subnet very well. To quickly find out the subnet range, we have to find out the increment and the network address of each subnet. Letג€™s take an example with the subnet 172.28.228.144/18:From the /18 (= 1100 0000 in the 3rd octet), we find out the increment is 64. Therefore the network address of this subnet must be the greatest multiple of the increment but not greater than the value in the 3rd octet (228). We can find out the 3rd octet of the network address is 192 (because 192 = 64 * 3 and 192 < 228) -> The network address is 172.28.192.0. So the first usable host should be 172.28.192.1 and it matches with the 5th answer on the right. In this case we donג€™t need to calculate the broadcast address because we found the correct answer.Letג€™s take another example with subnet 172.28.228.144/23 -> The increment is 2 (as /23 = 1111 1110 in 3rd octet) -> The 3rd octet of the network address is 228(because 228 is the multiply of 2 and equal to the 3rd octet) -> The network address is 172.28.228.0 -> The first usable host is 172.28.228.1. It is not necessary but if we want to find out the broadcast address of this subnet, we can find out the next network address, which is 172.28.(228 + the increment number).0 or172.28.230.0 then reduce 1 bit -> 172.28.229.255 is the broadcast address of our subnet. Therefore the last usable host is 172.28.229.254.

What are the main components to the Cisco Enterprise Architecture Model? (4)

Enterprise Campus Enterprise Edge Service Provider Edge Remote locations

How do TCP and UDP differ in the way that they establish a connection between two endpoints? A. TCP uses the three-way handshake, and UDP does not guarantee message delivery. B. TCP uses synchronization packets, and UDP uses acknowledgment packets. C. UDP provides reliable message transfer, and TCP is a connectionless protocol. D. UDP uses SYN, SYN ACK, and FIN bits in the frame header while TCP uses SYN, SYN ACK, and ACK bits.

How do TCP and UDP differ in the way that they establish a connection between two endpoints? A. TCP uses the three-way handshake, and UDP does not guarantee message delivery. B. TCP uses synchronization packets, and UDP uses acknowledgment packets. C. UDP provides reliable message transfer, and TCP is a connectionless protocol. D. UDP uses SYN, SYN ACK, and FIN bits in the frame header while TCP uses SYN, SYN ACK, and ACK bits.

How does TCP IP guarantee delivery?

How does TCP IP guarantee delivery? TCP tries to guarantee that if the data is delivered, it's correct and in order. It uses checksums to ensure data isn't corrupted, and sequence numbers to ensure that data is delivered in order and with no gaps. And it uses acknowledgements so the sender will know that data has been received

MAC address

MAC addresses are physical locations on a local area network, a.k.a. LAN, that are used to transmit data.

Name three Wi-Fi standards that support the 5 GHz spectrum

Name three Wi-Fi standards that support the 5 GHz spectrum: 802.1a 802.1ac 802.1n HINT anything that contains "a" or "n" is always 5GHz Anything that does not is 2.4GHz

Name the cloud service most likely to be used for software development

Platform as a Service PaaS

Refer to the exhibit. Drag and drop the networking parameters from the left onto the correct values on the right. Select and Place: default gateway 00:0C:22 host IP address 00:0C:22:83:79:A3 NIC MAC address 192.168.1.193 NIC vendor OUI 192.168.1.200 subnet 255.255.255.192

Refer to the exhibit. Drag and drop the networking parameters from the left onto the correct values on the right. Select and Place: NIC vendor OUI 00:0C:22 NIC MAC address 00:0C:22:83:79:A3 default gateway 192.168.1.193 host IP address 1 92.168.1.200 subnet mask 255.255.255.192 Explanation The ip route and addr show eth1 are Linux commands ip route: display the routing table ip addr show eth1: get depth information (only on eth1 interface) about your network interfaces like IP Address, MAC Address information

Refer to the exhibit. Which statement explains the configuration error message that is received? A. It belongs to a private IP address range. B. The router does not support /28 mask. C. It is a network IP address. D. It is a broadcast IP address.

Refer to the exhibit. Which statement explains the configuration error message that is received? A. It belongs to a private IP address range. B. The router does not support /28 mask. C. It is a network IP address. D. It is a broadcast IP address. For /28 network, There (2^4)=16 Subnets with each having (2^4-2)=14 host (14 +1 Network ID+ 1Broadcast ID)=16 Subnets are 192.168.16.0 192.168.16.16 ..... 192.168.16.128 192.168.16.144 (Above this network ID there will be address 192.168.16.143 which is a broadcast ID of Network 192.168.16.128 _______________________________________________________________________ Shortcut to find 1.First calculate subnets (barrowed 4 bits 2^4 = 16 subnets) or 256 - 240 (16) 2. Then do a math (256/16) = 16 subnets, If so (144/16) = 9 subnets so 144 is a subnet address and 143 is a broadcast address of previous network ID (128) it means (128 + 16) 144

Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (Choose two.) A. 5GHz provides increased network capacity with up to 23 nonoverlapping channels. B. 5GHz channel selection requires an autonomous access point. C. Cells that overlap one another are configured to use nonoverlapping channels. D. Adjacent cells with overlapping channels use a repeater access point. E. For maximum throughput, the WLC is configured to dynamically set adjacent access points to the channel.

Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (Choose two.) A. 5GHz provides increased network capacity with up to 23 nonoverlapping channels. B. 5GHz channel selection requires an autonomous access point. C. Cells that overlap one another are configured to use nonoverlapping channels. D. Adjacent cells with overlapping channels use a repeater access point. E. For maximum throughput, the WLC is configured to dynamically set adjacent access points to the channel. Correct Answer: CE

RWND

The Receiver Window (RWND) is a variable that advertises the amount of data that the destination side can receive.

DRAG DROP -Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right. Select and Place

This subnet question requires us to grasp how to subnet very well. To quickly find out the subnet range, we have to find out the increment and the network address of each subnet. Lets take an example with the subnet 172.28.228.144/18:From the /18 (= 1100 0000 in the 3rd octet), we find out the increment is 64. Therefore the network address of this subnet must be the greatest multiple of the increment but not greater than the value in the 3rd octet (228). We can find out the 3rd octet of the network address is 192 (because 192 = 64 * 3 and 192 < 228) -> The network address is 172.28.192.0. So the first usable host should be 172.28.192.1 and it matches with the 5th answer on the right. In this case we don't need to calculate the broadcast address because we found the correct answer. Lets take another example with subnet 172.28.228.144/23 -> The increment is 2 (as /23 = 1111 1110 in 3rd octet) -> The 3rd octet of the network address is 228(because 228 is the multiply of 2 and equal to the 3rd octet) -> The network address is 172.28.228.0 -> The first usable host is 172.28.228.1. It is not necessary but if we want to find out the broadcast address of this subnet, we can find out the next network address, which is 172.28.(228 + the increment number).0 or172.28.230.0 then reduce 1 bit -> 172.28.229.255 is the broadcast address of our subnet. Therefore the last usable host is 172.28.229.254.

Three virtual machines run on one physical server. What are three server resources commonly virtualized so each VM can use the required amount of that resource?

Three virtual machines run on one physical server. What are three server resources commonly virtualized so each VM can use the required amount of that resource? NIC RAM CPU

To which types of nodes should an ACI leaf switch connect in a typical single-site design? (Choose two answers) - All of the other leaf switches - A subset of the spine switches - All of the spine switches - Some of the endpoints - None of the endpoints

To which types of nodes should an ACI leaf switch connect in a typical single-site design? (Choose two answers) - All of the other leaf switches - A subset of the spine switches - All of the spine switches - Some of the endpoints - None of the endpoints

True or false, this statement correctly describes what happens when a web browser initiates a request to a web server. The sender allocates ports dynamically above 1024 and associates it with the request.

True or false, this statement correctly describes what happens when a web browser initiates a request to a web server. The sender allocates ports dynamically above 1024 and associates it with the request. True Dynamic allocation is always over 1024, not below 1024, and it is always the responsibility of the sender, not the receiver

What are the two stable port states used when STP has completed convergence ?

What are the two stable port states used when STP has completed convergence ? Blocking Forwarding

What are the two transitory port states used only during the process of STP convergence?

What are the two transitory port states used only during the process of STP convergence? Listening and Learning

What are three application characteristic values that are determined in the service level specification phase when designing the quality of service \ QoS policy of a network?

What are three application characteristic values that are determined in the service level specification phase when designing the quality of service \ QoS policy of a network? tolerable jitter tolerable packet loss required bandwidth

What are two examples of full hypervisors?

What are two examples of full hypervisors? type-1 type-2

What are two field names corresponding to the IPv4 header field and the IPv6 header field that contain Differentiated Services Code Point a.k.a. DSCP ?

What are two field names corresponding to the IPv4 header field and the IPv6 header field that contain Differentiated Services Code Point a.k.a. DSCP ? traffic class type of service a.k.a. ToS

What are two reasons that cause late collisions to increment on an Ethernet interface? A. When the sending device waits 15 seconds before sending the frame again B. When the cable length limits are exceeded C. when one side of the connection is configured for half-duplex D. when Carrier Sense Multiple Access/Collision Detection is used E. when a collision occurs after the 32nd byte of a frame has been transmitted

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two) A. when the sending device waits 15 seconds before sending the frame again B. when the cable length limits are exceeded C. when one side of the connection is configured for half-duplex D. when Carrier Sense Multiple Access/Collision Detection is used E. when a collision occurs after the 32nd byte of a frame has been transmitted Correct Answer: B and E A late collision is defined as any collision that occurs after the first 512 bits (or 64th byte) of the frame have been transmitted. The usual possible causes are full- duplex/half-duplex mismatch, exceeded Ethernet cable length limits, or defective hardware such as incorrect cabling, non-compliant number of hubs in the network, or a bad NIC.Late collisions should never occur in a properly designed Ethernet network. They usually occur when Ethernet cables are too long or when there are too many repeaters in the network.Reference:

What is CWND and what protocol is it used with ?

What is CWND and what protocol is it used with ? Congestion Window (cwnd) is a TCP state variable that limits the amount of data the TCP can send into the network before receiving an ACK.

What is a benefit of using a Cisco Wireless LAN Controller? A. It eliminates the need to configure each access point individually. B. Central AP management requires more complex configurations. C. Unique SSIDs cannot use the same authentication method. D. It supports autonomous and lightweight APs.

What is a benefit of using a Cisco Wireless LAN Controller? A. It eliminates the need to configure each access point individually. B. Central AP management requires more complex configurations. C. Unique SSIDs cannot use the same authentication method. D. It supports autonomous and lightweight APs. ______________________________________________________________________ A is correct: D could also be correct if there is no autonomous wording. Autonomous doesn't support LWAPP protocol ( Autonomous Ap's are standalone Ap's which does not support CAPWAP/LWAPP) that Wireless Lan Controller uses) _________________________________________________________________________ Option A & D seems to be correct But for Option D: Wireless LAN Controller not associated with Autonomous ( Meaning of Autonomous is "Standalone access point are known as Autonomous Access Point") Keyword Lightweight is correct WLC supports Lightweight but not autonomous

What is required before TCP can begin sending segments?

What is required before TCP can begin sending segments? A three-way handshake is required between the sender and receiver before TCP can begin sending traffic.

What is the default subnet mask for a class A address

What is the default subnet mask for a class A address - The default subnet mask for a Class A address is 255.0.0.0 - The default subnet mask for a Class B address is 255.255.0.0 - The default subnet mask for a Class C is 255.255.255.0 - The mask 255.255.255.255 is reserved to define a specific IP address and is not port of classful addressing

What mechanism allows for programs running on a server (daemons) to listen for requests through a process called binding?

What mechanism allows for programs running on a server (daemons) to listen for requests through a process called binding? port numbers When a daemon or server process starts, it binds to a port number on which to listen for a request. An example is a web server binding to the port number of TCP/80.

What occurs to frames during the process of frame flooding? A. Frames are sent to all ports, including those that are assigned to other VLANs. B. Frames are sent to every port on the switch that has a matching entry in MAC address table. C. Frames are sent to every port on the switch in the same VLAN except from the originating port. D. Frames are sent to every port on the switch in the same VLAN.

What occurs to frames during the process of frame flooding? A. Frames are sent to all ports, including those that are assigned to other VLANs. B. Frames are sent to every port on the switch that has a matching entry in MAC address table. C. Frames are sent to every port on the switch in the same VLAN except from the originating port. D. Frames are sent to every port on the switch in the same VLAN. Correct Answer: C

What protocol requires the programmer to deal with lost segments

What protocol requires the programmer to deal with lost segments ? UDP

When a network handles Voice over IP a.k.a VoIP packets differently than HTTP packets, what network feature is implemented?

When a network handles Voice over IP a.k.a VoIP packets differently than HTTP packets, what network feature is implemented? Quality of Service QoS

When an enterprise has to comply with strict data security regulations which cloud deployment model should they use for their services? - private - public - community - hybrid

When an enterprise has to comply with strict data security regulations which cloud deployment model should they use for their services? private cloud

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two.) A. 2000::/3 B. 2002::5 C. FC00::/7 D. FF02::1 E. FF02::2

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two.) A. 2000::/3 B. 2002::5 C. FC00::/7 D. FF02::1 E. FF02::2 Correct Answer: DE When an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) and solicited-node (FF02::1:FFxx:xxxx) multicast groups. The all- node group is used to communicate with all interfaces on the local link, and the solicited-nodes multicast group is required for link-layer address resolution. Routers also join a third multicast group, the all-routers group (FF02::2).Reference:

Where in the network should you implement QoS Packet classification?

Where in the network should you implement QoS packet classification ? at the input interface of a device at the LAN access edge of the network

Which 802.11 frame type is Association Response? A. management B. protected frame C. action D. control

Which 802.11 frame type is Association Response? A. management B. protected frame C. action D. control Correct Answer: A Explanation/Reference: There are three main types of 802.11 frames: the Data Frame, the Management Frame and the Control Frame. Association Response belongs to Management Frame. Association response is sent in response to an association request.

Which action is taken by switch port enabled for PoE power classification override? A. If a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled. B. When a powered device begins drawing power from a PoE switch port, a syslog message is generated. C. As power usage on a PoE switch port is checked, data flow to the connected device is temporarily paused. D. If a switch determines that a device is using less than the minimum configured power, it assumes the device has failed and disconnects it.

Which action is taken by switch port enabled for PoE power classification override? A. If a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled. B. When a powered device begins drawing power from a PoE switch port, a syslog message is generated. C. As power usage on a PoE switch port is checked, data flow to the connected device is temporarily paused. D. If a switch determines that a device is using less than the minimum configured power, it assumes the device has failed and disconnects it. Correct Answer: A PoE monitoring and policing compares the power consumption on ports with the administrative maximum value: either a configured maximum value or the ports default value. If the power consumption on a monitored port exceeds the administrative maximum value, the following actions occur: - A syslog message is issued. - The monitored port is shut down and error-disabled. - The allocated power is freed. Reference:https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/power_over_ethernet.pdf

Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface? A. explicitly assign a link-local address B. disable the EUI-64 bit process C. enable SLAAC on an interface D. configure a stateful DHCPv6 server on the network

Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface? A. explicitly assign a link-local address B. disable the EUI-64 bit process C. enable SLAAC on an interface D. configure a stateful DHCPv6 server on the network Correct Answer: C SLAAC stands for StateLess Address Auto Configuration It is the preferred method of assigning IP addresses in an IPv6 network. SLAAC devices send the router a request for the network prefix, and the device uses the prefix and its own MAC address to create an IP address

Which answer lists an advantage of controller-based networks versus traditionally networks (Choose two answer) - The ability to configure the features of the network rather than per device. - The ability to have forwarding tables at each device. - Programmatic APIs available per device. - More consistent device configuration.

Which answer lists an advantage of controller-based networks versus traditionally networks (Choose two answer) - The ability to configure the features of the network rather than per device. - The ability to have forwarding tables at each device. - Programmatic APIs available per device. - More consistent device configuration.

Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface? A. ipv6 address dhcp B. ipv6 address 2001:DB8:5:112::/64 eui-64 C. ipv6 address autoconfig D. ipv6 address 2001:DB8:5:112::2/64 link-local

Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface? A. ipv6 address dhcp B. ipv6 address 2001:DB8:5:112::/64 eui-64 C. ipv6 address autoconfig D. ipv6 address 2001:DB8:5:112::2/64 link-local Correct Answer: C The ipv6 address autoconfig command causes the device to perform IPv6 stateless address auto-configuration to discover prefixes on the link and then to add the EUI-64 based addresses to the interface. Addresses are configured depending on the prefixes received in Router Advertisement (RA) messages. The device will listen for RA messages which are transmitted periodically from the router (DHCP Server). This RA message allows a host to create a global IPv6 address from: Its interface identifier (EUI-64 address) Link Prefix (obtained via RA)Note: Global address is the combination of Link Prefix and EUI-64 address

Which function does the range of private IPv4 addresses perform? A. allows multiple companies to each use the same addresses without conflicts B. provides a direct connection for hosts from outside of the enterprise network C. ensures that NAT is not required to reach the Internet with private range addressing D. enables secure communications to the Internet for all external hosts

Which function does the range of private IPv4 addresses perform? A. allows multiple companies to each use the same addresses without conflicts B. provides a direct connection for hosts from outside of the enterprise network C. ensures that NAT is not required to reach the Internet with private range addressing D. enables secure communications to the Internet for all external hosts Correct Answer: A

Which network allows devices to communicate without the need to access the Internet? A. 172.9.0.0/16 B. 172.28.0.0/16 C. 192.0.0.0/8 D. 209.165.201.0/24

Which network allows devices to communicate without the need to access the Internet? A. 172.9.0.0/16 B. 172.28.0.0/16 C. 192.0.0.0/8 D. 209.165.201.0/24 Only the network 172.28.0.0/16 belongs to the private IP address (of class B). This question asks about the private ranges of IPv4 addresses. The private ranges of each class of IPv4 are listed below: Class A private IP address ranges from 10.0.0.0 to 10.255.255.255 Class B private IP address ranges from 172.16.0.0 to 172.31.255.255 Class C private IP address ranges from 192.168.0.0 to 192.168.255.255

Which of the following cloud services is most likely to be purchased and then used to later install your own software applications? IaaS PaaS SaaS SLBaaS

Which of the following cloud services is most likely to be purchased and then used to later install your own software applications? IaaS Infrastructure as a Service

Which of the following controller, if any, uses a mostly centralized control plane model? - OpenDaylight Controller - Cisco Application Policy Infrastructure Controller, aka, APIC - Cisco APIC Enterprise Module, aka, APIC-EM - None of these controllers

Which of the following controller, if any, uses a mostly centralized control plane model? OpenDaylight Controller

Which option enables one public address to be used for multiple internal private hosts?

Which option enables one public address to be used for multiple internal private hosts? PAT One public address for multiple internal private hosts is PAT, which can also be referenced as Overload or NAT overload.

Which protocol and port number is associated with SMTP

Which protocol and port number is associated with SMTP TCP and Port 25

Which statement identifies the functionality of virtual machines? A. The hypervisor communicates on Layer 3 without the need for additional resources. B. Each hypervisor can support a single virtual machine and a single software switch. C. The hypervisor can virtualize physical components including CPU, memory, and storage. D. Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor.

Which statement identifies the functionality of virtual machines? A. The hypervisor communicates on Layer 3 without the need for additional resources. B. Each hypervisor can support a single virtual machine and a single software switch. C. The hypervisor can virtualize physical components including CPU, memory, and storage. D. Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor.

Why does DNS use UDP for queries?

Why does DNS use UDP for queries? DNS requests are usually small and do not require connection setup

You have a web server with a private IP address within your network. You want users from the Internet to access it. Which type of NAT do you use?

You have a web server with a private IP address within your network. You want users from the Internet to access it. Which type of NAT do you use? Static NAT If you ever see a question dealing with accessing a server from the internet and NAT its going to be Static.

What is the name typically used to describe virtualization software?

hypervisor


Related study sets

Penny Chapter 30 : Chromosomal Abnormalities Review Questions

View Set

Exam 2 Review - Renal, Reproductive SDL

View Set

MKT 574: Chapter 9: Build the Brand

View Set