5-9 NETWORKING Flashcards

1
Q
  1. At which layers of the OSI model does Ethernet function? (Choose
    two.)
A

F. Data link
G. Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which standard specifies the Ethernet MAC sublayer functionality in
    a computer NIC?
A

B. IEEE 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What is the name given to the Ethernet MAC sublayer PDU?
A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What are the primary functions associated with data encapsulation at
    the Ethernet MAC sublayer? (Choose three.)
A

B. Frame delimiting
C. Addressing
E. Error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What happens when a data collision occurs on an Ethernet bus?
A

B. All devices stop transmitting and try again later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is true about the Ethernet MAC address? (Choose three.)
A

D. The vendor is responsible for assigning the last 24 bits of the MAC
address.
B. The first 6 hexadecimal digits of a MAC address represent the OUI.
E. The MAC address is also known as a burned-in address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the minimum and maximum Ethernet frame size as defined
by IEEE 802.3?

A

A. 64 bytes – 1518 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which field in an Ethernet frame is used for error detection?
A

D. Frame Check Sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which address is used as a destination address on a broadcast
Ethernet frame?

A

C. FF-FF-FF-FF-FF-FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which address is a multicast MAC address?

A

B. 01-00-5E-00-00-C8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What functions are provided by the ARP process? (Choose two.)
A

A. Resolving IPv4 addresses to MAC addresses
C. Maintaining a table of mappings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which devices on a network will receive an ARP request?

A

B. All devices in the L2 broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blanks. When ARP receives a request to map an
IPv4 address to a MAC address, it first looks in its _____. If no entry is
found, ARP will send out an ARP_____.

A

arp table
request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a device receives an ARP request for a device with a different IP address, it will use the __ information to update its ARP table and then it will _____ the packet

A

source
drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP _____ are sent to a broadcast MAC
address, and ARP replies are sent to a _____ MAC address.

A

requests
unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a switch receives a broadcast
frame, it enters the source information in its _____ and then it _____
the frame to all ports except the one the frame was _____ on.

A

mac address table
floods
received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The MAC address table is sometimes
referred to as a ____ table because it is stored in _____ memory.

A

cam
content addressable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. What type of switching is used on current L2 switches to allow QoS?
A

store nd forward
fragment free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If the source and destination IPv4 addresses are on the same network,
the destination MAC address will be that of which device

A

A. The same device as the destination IPv4 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If the source and destination IPv4 addresses are on different
networks, the destination MAC address will be that of which device?

A

B. The default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Which layer of the OSI model is concerned with end-to-end
    communication over the network?
A

A. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Which of the following is associated with the network layer?
A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Why was IPv4 designed as a connectionless protocol?
A

IP is connectionless, which greatly reduces the overhead of IP.
Therefore, there is no initial exchange of control information before
packets are forwarded, and no additional fields exist in the header to maintain an established connection

24
Q
  1. On a router, what field in an IPv4 header should be examined to
    determine that the maximum number of hops has been reached by the
    packet on its way from the source to this destination?
A

C. TTL

25
Q
  1. When configuring a host, the gateway was not configured. How will
    this affect communication to and from this device?
A

C. Communication will be limited to hosts in the local network.

26
Q

. In what part of a router is the running configuration being used
located?

A

RAM

27
Q
  1. During the boot process of a Cisco router, you notice a series of hash
    symbols (#) appearing on the terminal emulator screen from the console
    session. In what phase is the boot process?
A

B. Loading the IOS

28
Q

What are the required steps for configuring an interface on a router?

A

Provide Layer 3 addressing info
activate the interface

29
Q

The ip default-gateway command was not used when
configuring a switch. How will this affect network communication?

A

A. Host communication through the switch will not be affected.
E. Communication to and from the switch will be limited to hosts in
the local network.

30
Q
  1. When using the netstat -r command on a host, you see a route
    0.0.0.0 0.0.0.0. What does this route represent?
A

C. Destinations without a specified route are forwarded to the gateway.

31
Q

. What are the parts of an IPv4 address? (Choose two.)

A

A. Host
B. Network

32
Q
  1. What is the purpose of the network address?
A

B. To refer to a network

33
Q
  1. What are characteristics in common among unicast, broadcast, and
    multicast IPv4 communication? (Choose two.)
A

A. The source address is always a unicast address.

C. There are never multiple destination addresses in the header.

34
Q

. Which of the following IPv4 addresses would be used in a private
network?

A

D. 192.168.1.1

35
Q
  1. What is the principal reason for the development of IPv6?
A

overcome ipv4 exhaustion

36
Q
  1. How are IPv6 addresses represented?
A

C. 8 hextets separated by colons

37
Q
  1. What type of IPv6 address should be used for communication that is
    limited to a single network segment?
A

B. Link-local

38
Q
  1. What methods automatically provide IPv6 global unicast addresses?
    (Choose two.)
A

A. SLAAC
B. Stateful DHCPv6

39
Q
  1. Which type of IPv4 address allows a host to send a message to a
    group of hosts?
A

C. Multicast

40
Q

What protocol is used in IP networks to verify connectivity?

A

ICMP protocol

41
Q

What utility is used to identify network path between hosts?

A

D. Traceroute

42
Q
  1. What are advantages of subnetting a large network? (Choose two.)
A

B. Overall network traffic is reduced.
D. Network performance is improved.

43
Q

What device would permit hosts on different subnets to be able to
communicate?

A

C. Router

44
Q

To create subnets, bits are borrowed from the ____
portion of an IP address

A

host

45
Q

. How many subnets can be created if 4 bits are borrowed to specify
subnets?

A

16

46
Q

What best describes a network broadcast address?

A

D. All 1 bits in the host portion of the address

47
Q

. How many valid host addresses are created when 4 host bits are
borrowed from the 10.20.20.0/24 network?

A

C. 14

48
Q

A junior network technician has sub netted the 10.20.30.0/24 address
space by borrowing 3 bits. The technician decides to use the second
subnet for the Accounting department computers. Which of the
following addresses could the network technician assign to hosts?
(Choose three.)

A

D. 10.20.30.33/27
E. 10.20.30.34/27
F. 10.20.30.35/27

49
Q

A junior network technician is assigning host addresses to devices in
the 192.168.1.0/25 subnet. The departmental printer is assigned the
address 192.168.1.131/25 with a 192.168.1.1/25 default gateway. No
one in the department is able to print. What is the cause of the problem?

A

C. The printer has been assigned an address on another subnet.

50
Q

A new department has been established with 511 hosts that require
addresses. Currently the company uses the 10.20.0.0/16 address space.
How many bits must the network administrator borrow to provide
addresses for this subnet without wasting addresses?

A

B. 6

51
Q

A network technician borrows 5 bits from the 10.0.0.0/16 network to
create subnets. What is the subnet mask that should be associated with
each of the newly created subnets?

A

C. 255.255.248.0

52
Q

____ provides a more efficient IP address allocation
by allowing the use of different-size subnets in the same network

A

VLSM

53
Q

A network administrator has borrowed 3 bits from the 10.20.0.0/25
network to create subnets. The administrator then decided to use the
first subnet for point-to-point serial WAN connections each requiring
two addresses. How many WAN connections can the administrator
address using only the first subnet if he is using VLSM?

A

4

54
Q

A network administrator has decided to use VLSM to subnet the
10.11.0.0/20 network to provide addresses for two new departments
and the point-to-point link that separates the two departments. The first
department has 796 users and the second department has 31 users. The
WAN link requires only two addresses. Which of the following subnets
will provide the required contiguous space and waste the fewest
addresses? (Choose three.)

A

10.11.0.0/22

D. 10.11.253.0/26

F. 10.11.253.64/30

55
Q

What is the primary purpose of subnetting an IPv6 address space?

A

B. Support hierarchical network design
C. Manage network traffic

56
Q

What is the most common process to subnet an IPv6 network?

A

A. Use the range of hexadecimal values in the subnet ID