ICND1 Flashcards
How does a switch differ from a hub?
A. A switch does not induce any latency into the frame transfer time.
B. A switch tracks MAC addresses of directly-connected devices.
C. A switch operates at a lower, more efficient layer of the OSI model.
D. A switch decreases the number of broadcast domains.
E. A switch decreases the number of collision domains.
B. A switch tracks MAC addresses of directly-connected devices.
Explanation:
Some of the features and functions of a switch include:
A switch is essentially a fast, multi-port bridge, which can contain dozens of ports. Rather than creating
two collision domains, each port creates its own collision domain. In a network of twenty nodes, twenty
collision domains exist if each node is plugged into its own switch port. If an uplink port is included, one
switch creates twenty-one single-node collision domains. A switch dynamically builds and maintains a
Content-Addressable Memory (CAM) table, holding all of the necessary MAC information for each port.
What must occur before a workstation can exchange HTTP packets with a web server?
A. A UDP connection must be established between the workstation and its default gateway.
B. A UDP connection must be established between the workstation and the web server.
C. A TCP connection must be established between the workstation and its default gateway.
D. A TCP connection must be established between the workstation and the web server.
E. An ICMP connection must be established between the workstation and its default gateway.
F. An ICMP connection must be established between the workstation and the web server.
D. A TCP connection must be established between the workstation and the web server.
Explanation:
HTTP uses TCP port 80.
3.How does TCP differ from UDP? (Choose two.)
A. TCP provides best effort delivery.
B. TCP provides synchronized communication.
C. TCP segments are essentially datagrams.
D. TCP provides sequence numbering of packets.
E. TCP uses broadcast delivery.
B. TCP provides synchronized communication.
D. TCP provides sequence numbering of packets.
Explanation:
TCP differs from UDP in the following ways: TCP provides best effort delivery.
TCP provides synchronized communication. TCP segments are essentially datagrams. TCP provides
sequence numbering of packets. TCP uses broadcast delivery.
4.A workstation has just resolved a browser URL to the IP address of a server.
What protocol will the workstation now use to determine the destination MAC address to be placed into
frames directed toward the server?
A. HTTP B. DNS C. DHCP D. RARP E. ARP
E. ARP
Host A is sending a packet to Host B for the first time.
What destination MAC address will Host A use in the ARP request?
A. 192.168.0.1 B. 172.16.0.50 C. 00-17-94-61-18-b0 D. 00-19-d3-2d-c3-b2 E. ff-ff-ff-ff-ff-ff F. 255.255.255.255
E. ff-ff-ff-ff-ff-ff
Explanation:
For the initial communication, Host A will send a broadcast ARP (all F’s) to determine the correct address
to use to reach the destination.
The network manager has requested a 300-workstation expansion of the network.
The workstations are to be installed in a single broadcast domain, but each workstation must have its own
collision domain. The expansion is to be as cost-effective as possible while still meeting the requirements.
Which three items will adequately fulfill the request? (Choose three).
A. one IP subnet with a mask of 255.255.254.0
B. two IP subnets with a mask of 255.255.255.0
C. seven 48-port hubs
D. seven 48-port switches
E. one router interface
F. seven router interfaces
A. one IP subnet with a mask of 255.255.254.0
D. seven 48-port switches
E. one router interface
Explanation:
A 255.255.254.0 subnet can absorb 510 hosts being a 23 bit mask and also 7*48 port switches can handle this
much hosts and router interface is required to be minimum to avoid unnecessary wastage hence the answers.
What are two common TCP applications? (Choose two.)
A. TFTP B. SMTP C. SNMP D. FTP E. DNS
B. SMTP
D. FTP
Explanation:
SMTP uses TCP port 25, while FTP uses TCP ports 20 and 21.
Which method does a connected trunk port use to tag VLAN traffic?
A. IEEE 802 1w
B. IEEE 802 1D
C. IEEE 802 1Q
D. IEEE 802 1p
C. IEEE 802 1Q
Explanation:
IEEE 802.1Q is the networking standard that supports virtual LANs (VLANs) on an Ethernet network.
When a frame enters the VLAN-aware portion of the network (a trunk link, for example), a VLAN ID tag is
added to represent the VLAN membership of that frame. The picture below shows how VLAN tag is
added and removed while going through the network.
Which two statements describe the operation of the CSMA/CD access method? (Choose two.)
A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the
CSMA/CD access method.
D. After a collision, the station that detected the collision has first priority to resend the lost data.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired,
all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each
other prior to transmitting data.
B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired,
all stations have equal priority to transmit data.
Explanation:
Ethernet networking uses Carrier Sense Multiple Access with Collision Detect (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the
network medium. CSMA/CD was created to overcome the problem of those collisions that occur when
packets are transmitted simultaneously from different nodes. And trust me, good collision management is
crucial, because when a node transmits in a CSMA/CD network, all the other nodes on the network
receive and examine that transmission. Only bridges and routers can effectively prevent a transmission from propagating throughout the entire network! So, how does the CSMA/CD protocol work? Like this:
when a host wants to transmit over the network, it first checks for the presence of a digital signal on the
wire. If all is clear (no other host is transmitting), the host will then proceed with its transmission. But it
doesn’t stop there. The transmitting host constantly monitors the wire to make sure no other hosts begin
transmitting. If the host detects another signal on the wire, it sends out an extended jam signal that
causes all nodes on the segment to stop sending data (think, busy signal). The nodes respond to that jam
signal by waiting a while before attempting to transmit again. Backoff algorithms determine when the
colliding stations can retransmit. If collisions keep occurring after 15 tries, the nodes attempting to
transmit will then time out.
Which two options will help to solve the problem of a network that is suffering a broadcast storm?
(Choose two.)
A. a bridge B. a router C. a hub D. a Layer 3 switch E. an access point
B. a router
D. a Layer 3 switch
Explanation:
Routers and layer 3 switches will not propagate broadcast traffic beyond the local segment, so the use of
these devices is the best method for eliminating broadcast storms.
What does a host on an Ethernet network do when it is creating a frame and it does not have the
destination address?
A. drops the frame
B. sends out a Layer 3 broadcast message
C. sends a message to the router requesting the address
D. sends out an ARP request with the destination IP address
D. sends out an ARP request with the destination IP address
Explanation:
Understanding this concept is prime for understanding that when switch receives the data frame from the
host not having the MAC address already in the MAC table, it will add the MAC address to the source port
on the MAC address table and sends the data frame. If the switch already has the MAC address in it’s
table for the destination, it will forward the frame directly to the destination port. If it was not already in it’s MAC table, then they frame would have been flooded out all ports except for the port that it came from.
A switch has 48 ports and 4 VLANs.
How many collision and broadcast domains exist on the switch (collision, broadcast)?
A. 4, 48 B. 48, 4 C. 48, 1 D. 1, 48 E. 4, 1
B. 48, 4
Explanation:
A switch uses a separate collision domain for each port, and each VLAN is a separate broadcast domain.
Which address type does a switch use to make selective forwarding decisions?
A. source IP address B. destination IP address C. source and destination IP address D. source MAC address E. destination MAC address
E. destination MAC address
Explanation:
Switches analyze the destination MAC to make its forwarding decision since it is a layer 2 device. Routers
use the destination IP address to make forwarding decisions.
On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another
vendor?
A. RTP
B. TCP
C. CDP
D. UDP
C. CDP
Explanation:
The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per port
power management details, and Quality of Service (QoS) configuration information with the Cisco
Catalyst switch.
A switch receives a frame on one of its ports. There is no entry in the MAC address table for the
destination MAC address.
What will the switch do with the frame?
A. drop the frame
B. forward it out of all ports except the one that received it
C. forward it out of all ports
D. store it until it learns the correct port
B. forward it out of all ports except the one that received it
Explanation:
Understanding this concept is prime for understanding that when switch receives the data frame from the
host not having the MAC address already in the MAC table, it will add the MAC address to the source port
on the MAC address table and sends the data frame. If the switch already has the MAC address in it’s
table for the destination, it will forward the frame directly to the destination port. If it was not already in it’s MAC table, then they frame would have been flooded out all ports except for the port that it came from.
At which layer of the OSI model does the protocol that provides the information that is displayed by the
show cdp neighbors command operate?
A. application B. transport C. network D. physical E. data link
E. data link
Explanation:
CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco- manufactured
devices (routers, bridges, access servers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices.With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols.
Which two characteristics apply to Layer 2 switches? (Choose two.)
A. increases the number of collision domains
B. decreases the number of collision domains
C. implements VLAN
D. decreases the number of broadcast domains
E. uses the IP address to make decisions for forwarding data packets
A. increases the number of collision domains
C. implements VLAN
Explanation:
Layer 2 switches offer a number of benefits to hubs, such as the use of VLANs and each switch port is in
its own separate collision domain, thus eliminating collisions on the segment.
Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface?
(Choose two.)
A. router#show version B. router#show ip interface C. router#show protocols D. router#show controllers E. router#show running-config
B. router#show ip interface
C. router#show protocols
Which two characteristics describe the access layer of the hierarchical network design model?
(Choose two.)
A. layer 3 support B. port security C. redundant components D. VLANs E. PoE
B. port security
D. VLANs
Explanation:
The primary function of an access-layer is to provide network access to the end user.
The hardware and software attributes of the access layer that support high availability include security
services for additional security against unauthorized access to the network through the use of tools such
as 802.1x, port security, DHCP snooping, Dynamic ARP Inspection, and IP Source Guard.
What is the purpose of assigning an IP address to a switch?
A. provides local hosts with a default gateway address
B. allows remote management of the switch
C. allows the switch to respond to ARP requests between two hosts
D. ensures that hosts on the same LAN can communicate with each other
B. allows remote management of the switch
Explanation:
Switch is a layer 2 device and doesn’t use network layer for packet forwarding. The IP address may be
used only for administrative purposes such as Telnet access or for network management purposes.
Which three statements are true about the operation of a full-duplex Ethernet network? (Choose three.)
A. There are no collisions in full-duplex mode.
B. A dedicated switch port is required for each full-duplex node.
C. Ethernet hub ports are preconfigured for full-duplex mode.
D. In a full-duplex environment, the host network card must check for the availability of the network media
before transmitting.
E. The host network card and the switch port must be capable of operating in full-duplex mode.
A. There are no collisions in full-duplex mode.
B. A dedicated switch port is required for each full-duplex node.
E. The host network card and the switch port must be capable of operating in full-duplex mode.
Explanation:
Half-duplex Ethernet is defined in the original 802.3 Ethernet and Cisco says you only use one wire pair
with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help
prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it
must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex
Ethernet–typically 10BaseT–is only about 30 to 40 percent efficient as Cisco sees it, because a large
10BaseT network will usually only give you 3- to 4Mbps–at most. Full-duplex Ethernet uses two pairs of
wires, instead of one wire pair like half duplex. Also, full duplex uses a point-to-point connection between
the transmitter of the transmitting device and the receiver of the receiving device, which means that with
full-duplex data transfer, you get a faster data transfer compared to half duplex. And because the
transmitted data is sent on a different set of wires than the received data, no collisions occur. The reason
you don’t need to worry about collisions is because now Full-duplex Ethernet is like a freeway with
multiple lanes instead of the single-lane road provided by half duplex. Full-duplex Ethernet is supposed to
offer 100 percent efficiency in both directions; this means you can get 20Mbps with a 10Mbps Ethernet
running full duplex, or 200Mbps for FastEthernet.
Which router command can be used to determine the status of Serial 0/0?
A. show ip route B. show interfaces C. show s0/0 status D. debug s0/0 E. show run F. show version
B. show interfaces
What is the subnet address of 172.16.159.159/22?
A. 172.16.0.0 B. 172.16.128.0 C. 172.16.156.0 D. 172.16.159.0 E. 172.16.159.128 F. 172.16.192.0
C. 172.16.156.0
Explanation:
Converting to binary format it comes to
11111111.11111111.11111100.00000000 or 255.255.252.0
Starting with 172.16.0.0 and having increment of 4 we get.
An administrator is working with the 192.168.4.0 network, which has been subnetted with a /26 mask.
Which two addresses can be assigned to hosts within the same subnet? (Choose two.)
A. 192.168.4.61 B. 192.168.4.63 C. 192.168.4.67 D. 192.168.4.125 E. 192.168.4.128 F. 192.168.4.132
C. 192.168.4.67
D. 192.168.4.125
Explanation:
Only the values of host with 67 and 125 fall within the range of /26 CIDR subnet mask, all others lie
beyond it.