CCNA 1 v7.0 Final Exam Answers Full - Introduction
to Networks Exam Questions and Answers
1. What two ICMPv6 message types must be permitted through IPv6 access
control lists to allow resolution of Layer 3 addresses to Layer 2 MAC
addresses? - -neighbour solicitations
neighbour advertisements
-Which range of link-local addresses can be assigned to an IPv6-enabled
interface? - -FE80::/10
-What would be the interface ID of an IPv6 enabled interface with a MAC
address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using
the EUI-64 process? - -1E6F:65FF:FEC2:BDF8
-An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56.
How many subnets can be created without using bits in the interface ID
space? - -256
-When a switch configuration includes a user-defined error threshold on a
per-port basis, to which switching method will the switch revert when the
error threshold is reached? - -store-and-forward
-Which two statements are correct about MAC and IP addresses during data
transmission if NAT is not involved? - --Destination IP addresses in a packet
header remain constant along the entire path to a target host.
-Destination and source MAC addresses have local significance and change
every time a frame goes from one LAN to another.
-What is one main characteristic of the data link layer? - -It shields the
upper layer protocol from being aware of the physical medium to be used in
the communication.
-What are three characteristics of the CSMA/CD process? - -- A device
listens and waits until the media is not busy before transmitting.
- After detecting a collision, hosts can attempt to resume transmission after a
random time delay has expired.
- All of the devices on a segment see data that passes on the network
medium.
-What are two primary responsibilities of the Ethernet MAC sublayer? - -
accessing the media
data encapsulation
, -Which two commands can be used on a Windows host to display the routing
table? - -route print
netstat -r
-What are two functions that are provided by the network layer? - --
directing data packets to destination hosts on other networks
- providing end devices with a unique network identifier
-Which two statements describe features of an IPv4 routing table on a
router? - -- If there are two or more possible routes to the same destination,
the route associated with the higher metric value is included in the routing
table.
- If a default static route is configured in the router, an entry will be included
in the routing table with source code S.
-How does the service password-encryption command enhance password
security on Cisco routers and switches? - -It encrypts passwords that are
stored in router or switch configuration files.
-Why would a Layer 2 switch need an IP address? - -to enable the switch to
be managed remotely
-What characteristic describes identity theft? - -the use of stolen credentials
to access private data
-A user sends an HTTP request to a web server on a remote network. During
encapsulation for this request, what information is added to the address field
of a frame to indicate the destination? - -the MAC address of the default
gateway
-Data is being sent from a source PC to a destination server. Which three
statements correctly describe the function of TCP or UDP in this situation? -
-- The source port field identifies the running application or service that will
handle data returning to the PC.
- UDP segments are encapsulated within IP packets for transport across the
network.
- The UDP destination port number identifies the application or service on the
server which will handle the data.
-A company uses the address block of 128.107.0.0/16 for its network. What
subnet mask would provide the maximum number of equal size subnets
while providing enough host addresses for each subnet in the exhibit? - -
255.255.255.128
to Networks Exam Questions and Answers
1. What two ICMPv6 message types must be permitted through IPv6 access
control lists to allow resolution of Layer 3 addresses to Layer 2 MAC
addresses? - -neighbour solicitations
neighbour advertisements
-Which range of link-local addresses can be assigned to an IPv6-enabled
interface? - -FE80::/10
-What would be the interface ID of an IPv6 enabled interface with a MAC
address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using
the EUI-64 process? - -1E6F:65FF:FEC2:BDF8
-An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56.
How many subnets can be created without using bits in the interface ID
space? - -256
-When a switch configuration includes a user-defined error threshold on a
per-port basis, to which switching method will the switch revert when the
error threshold is reached? - -store-and-forward
-Which two statements are correct about MAC and IP addresses during data
transmission if NAT is not involved? - --Destination IP addresses in a packet
header remain constant along the entire path to a target host.
-Destination and source MAC addresses have local significance and change
every time a frame goes from one LAN to another.
-What is one main characteristic of the data link layer? - -It shields the
upper layer protocol from being aware of the physical medium to be used in
the communication.
-What are three characteristics of the CSMA/CD process? - -- A device
listens and waits until the media is not busy before transmitting.
- After detecting a collision, hosts can attempt to resume transmission after a
random time delay has expired.
- All of the devices on a segment see data that passes on the network
medium.
-What are two primary responsibilities of the Ethernet MAC sublayer? - -
accessing the media
data encapsulation
, -Which two commands can be used on a Windows host to display the routing
table? - -route print
netstat -r
-What are two functions that are provided by the network layer? - --
directing data packets to destination hosts on other networks
- providing end devices with a unique network identifier
-Which two statements describe features of an IPv4 routing table on a
router? - -- If there are two or more possible routes to the same destination,
the route associated with the higher metric value is included in the routing
table.
- If a default static route is configured in the router, an entry will be included
in the routing table with source code S.
-How does the service password-encryption command enhance password
security on Cisco routers and switches? - -It encrypts passwords that are
stored in router or switch configuration files.
-Why would a Layer 2 switch need an IP address? - -to enable the switch to
be managed remotely
-What characteristic describes identity theft? - -the use of stolen credentials
to access private data
-A user sends an HTTP request to a web server on a remote network. During
encapsulation for this request, what information is added to the address field
of a frame to indicate the destination? - -the MAC address of the default
gateway
-Data is being sent from a source PC to a destination server. Which three
statements correctly describe the function of TCP or UDP in this situation? -
-- The source port field identifies the running application or service that will
handle data returning to the PC.
- UDP segments are encapsulated within IP packets for transport across the
network.
- The UDP destination port number identifies the application or service on the
server which will handle the data.
-A company uses the address block of 128.107.0.0/16 for its network. What
subnet mask would provide the maximum number of equal size subnets
while providing enough host addresses for each subnet in the exhibit? - -
255.255.255.128