100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CCNA 1 INTRODUCTION TO NETWORKS V7.0 EXAM QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
37
Grade
A+
Uploaded on
04-07-2025
Written in
2024/2025

CCNA 1 INTRODUCTION TO NETWORKS V7.0 EXAM QUESTIONS AND ANSWERS

Institution
CCNA
Course
CCNA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CCNA
Course
CCNA

Document information

Uploaded on
July 4, 2025
Number of pages
37
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CCNA 1: INTRODUCTION TO
NETWORKS V7.0 EXAM QUESTIONS
AND ANSWERS

What two ICMPv6 message types must be permitted through IPv6 access control lists
to allow resolution of Layer 3 addresses to Layer 2 MAC addresses?

neighbor solicitations
echo requests
neighbor advertisements
echo replies
router solicitations
router advertisements - Correct Answers -1) neighbor solicitations

2) neighbor advertisements

Which range of link-local addresses can be assigned to an IPv6-enabled interface?

FEC0::/10
FDEE::/7
FE80::/10
FF00::/8 - Correct Answers -FE80::/10

Link-local addresses are in the range of FE80::/10 to FEBF::/10.

The original IPv6 specification defined site-local addresses and used the prefix range
FEC0::/10, but these addresses were deprecated by the IETF in favor of unique local
addresses.

FDEE::/7 is a unique local address because it is in the range of FC00::/7 to FDFF::/7.

IPv6 multicast addresses have the prefix FF00::/8.

What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-
6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?

0C6F:65FF:FEC2:BDF8
1E6F:65FF:FEC2:BDF8
C16F:65FF:FEC2:BDF8
106F:65FF:FEC2:BDF8 - Correct Answers -1E6F:65FF:FEC2:BDF8

,To derive the EUI-64 interface ID by using the MAC address 1C-6F-65-C2-BD-F8, three
steps are taken.

Change the seventh bit of the MAC address from a binary 0 to a binary 1 which
changes the hex C, into a hex E.

Insert hex digits FFFE into the middle of the address.
Rewrite the address in IPv6 format.

The three steps, when complete, give the interface ID of 1E6F:65FF:FEC2:BDF8.

An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56.

How many subnets can be created without using bits in the interface ID space?

256
512
1024
4096 - Correct Answers -256

Refer to the exhibit.

If host A sends an IP packet to host B, what will the destination address be in the frame
when it leaves host A?

DD:DD:DD:DD:DD:DD
172.168.10.99
CC:CC:CC:CC:CC:CC
172.168.10.65
BB:BB:BB:BB:BB:BB
AA:AA:AA:AA:AA:AA - Correct Answers -BB:BB:BB:BB:BB:BB

When a host sends information to a distant network, the Layer 2 frame header will
contain a source and destination MAC address.

The source address will be the originating host device. The destination address will be
the router interface that connects to the same network.

In the case of host A sending information to host B, the source address is
AA:AA:AA:AA:AA:AA and the destination address is the MAC address assigned to the
R2 Ethernet interface, BB:BB:BB:BB:BB:BB.

When a switch configuration includes a user-defined error threshold on a per-port basis,
to which switching method will the switch revert when the error threshold is reached?

,cut-through
store-and-forward
fast-forward
fragment-free - Correct Answers -store-and-forward

Which two statements are correct about MAC and IP addresses during data
transmission if NAT is not involved?

* Destination IP addresses in a packet header remain constant along the entire path to
a target host.

* Destination MAC addresses will never change in a frame that goes across seven
routers.

* Every time a frame is encapsulated with a new destination MAC address, a new
destination IP address is needed.

* Destination and source MAC addresses have local significance and change every time
a frame goes from one LAN to another.

* A packet that has crossed four routers has changed the destination IP address four
times. - Correct Answers -1) Destination IP addresses in a packet header remain
constant along the entire path to a target host.

2) Destination and source MAC addresses have local significance and change every
time a frame goes from one LAN to another.

What is one main characteristic of the data link layer?

* It generates the electrical or optical signals that represent the 1 and 0 on the media.

* It converts a stream of data bits into a predefined code.

* It shields the upper layer protocol from being aware of the physical medium to be used
in the communication.

* It accepts Layer 3 packets and decides the path by which to forward the packet to a
remote network. - Correct Answers -It shields the upper layer protocol from being aware
of the physical medium to be used in the communication.

What are three characteristics of the CSMA/CD process?

* The device with the electronic token is the only one that can transmit after a collision.

* A device listens and waits until the media is not busy before transmitting.

, * After detecting a collision, hosts can attempt to resume transmission after a random
time delay has expired.

* All of the devices on a segment see data that passes on the network medium.

* A jam signal indicates that the collision has cleared and the media is not busy.

* Devices can be configured with a higher transmission priority. - Correct Answers -1) A
device listens and waits until the media is not busy before transmitting.

2) After detecting a collision, hosts can attempt to resume transmission after a random
time delay has expired.

3) All of the devices on a segment see data that passes on the network medium.

The Carrier Sense Multiple Access/Collision Detection (CSMA/CD) process is a
contention-based media access control mechanism used on shared media access
networks, such as Ethernet.

When a device needs to transmit data, it listens and waits until the media is available
(quiet), then it will send data.

If two devices transmit at the same time, a collision will occur.

Both devices will detect the collision on the network. When a device detects a collision,
it will stop the data transmission process, wait for a random amount of time, then try
again.

What are two primary responsibilities of the Ethernet MAC sublayer?

error detection
frame delimiting
accessing the media
data encapsulation
logical addressing - Correct Answers -1) accessing the media

2) data encapsulation

Which two commands can be used on a Windows host to display the routing table?

netstat -s
route print
show ip route
netstat -r
tracert - Correct Answers -1) route print

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
millyphilip West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
2812
Member since
3 year
Number of followers
1959
Documents
40838
Last sold
1 day ago
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.7

534 reviews

5
234
4
83
3
103
2
31
1
83

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions