100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CCNA v7 Final Exam Questions and Answers 100% Pass

Rating
-
Sold
-
Pages
44
Grade
A+
Uploaded on
14-03-2023
Written in
2022/2023

CCNA v7 Final Exam Questions and Answers 100% Pass What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? -neighbor solicitations -neighbor advertisements Which range of link-local addresses can be assigned to an IPv6-enabled interface? FE80::/10 What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process? 1E6F:65FF:FEC2:BDF8 An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space? 256 Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A? BB:BB:BB:BB:BB:BB - Explain:When a host sends information to a distant network, the Layer 2 frame header will contain a source and destination MAC address. The source address will be the originating host device. The destination address will be the router interface that connects to the same network. In the case of host A sending information to host B, the source address is AA:AA:AA:AA:AA:AA and the destination address is the MAC address assigned to the R2 Ethernet interface, BB:BB:BB:BB:BB:BB. When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached? store-and-forward Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.) -Destination IP addresses in a packet header remain constant along the entire path to a target host. -Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another. What is one main characteristic of the data link layer? It shields the upper layer protocol from being aware of the physical medium to be used in the communication. What are three characteristics of the CSMA/CD process? (Choose three.) -A device listens and waits until the media is not busy before transmitting. -After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. -All of the devices on a segment see data that passes on the network medium. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) -accessing the media -data encapsulation Which two commands can be used on a Windows host to display the routing table? (Choose two.) -netstat -r -route print Explain:On a Windows host, the route print or netstat -r commands can be used to display the host routing table. Both commands generate the same output. On a router, the show ip route command is used to display the routing table. The netstat -s command is used to display per-protocol statistics. The tracert command is used to display the path that a packet travels to its destination. What are two functions that are provided by the network layer? (Choose two.) -directing data packets to destination hosts on other networks -providing end devices with a unique network identifier Which two statements describe features of an IPv4 routing table on a router? (Choose two.) -Directly connected interfaces will have two route source codes in the routing table: C and S. -If a default static route is configured in the router, an entry will be included in the routing table with source code S. How does the service password-encryption command enhance password security on Cisco routers and switches? -It encrypts passwords that are stored in router or switch configuration files. Why would a Layer 2 switch need an IP address? to enable the switch to be managed remotely What characteristic describes identity theft? the use of stolen credentials to access private data Match each description to its corresponding term. (Not all options are used.) - A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination? the MAC address of the default gateway Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) -UDP segments are encapsulated within IP packets for transport across the network. -The UDP destination port number identifies the application or service on the server which will handle the data. -The source port field identifies the running application or service that will handle data returning to the PC. -Explanation: Layer 4 port numbers identify the application or service which will handle the data. The source port number is added by the sending device and will be the destination port number when the requested information is returned. Layer 4 segments are encapsulated within IP packets. UDP, not TCP, is used when low overhead is needed. A source IP address, not a TCP source port number, identifies the sending host on the network. Destination port numbers are specific ports that a server application or service monitors for requests. Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.) 10.18.10.208/28 - 10.18.10.224/28 -Explanation: Addresses 10.18.10.0 through 10.18.10.63 are taken for the leftmost network. Addresses 192 through 199 are used by the center network. Because 4 host bits are needed to accommodate 10 hosts, a /28 mask is needed. 10.18.10.200/28 is not a valid network number. Two subnets that can be used are 10.18.10.208/28 and 10.18.10.224/28. Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit? 255.255.255.128 Explanation: The largest subnet in the topology has 100 hosts in it so the subnet mask must have at least 7 host bits in it (27-2=126). 255.255.255.0 has 8 hosts bits, but this does not meet the requirement of providing the maximum number of subnets. A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of dev

Show more Read less
Institution
CCNA - Cisco Certified Network Associate
Course
CCNA - Cisco Certified Network Associate











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CCNA - Cisco Certified Network Associate
Course
CCNA - Cisco Certified Network Associate

Document information

Uploaded on
March 14, 2023
Number of pages
44
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CCNA v7 Final Exam Questions and Answers 100% Pass What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 address es to Layer 2 MAC addresses? ✔✔-neighbor solicitations -neighbor advertisements Which range of link -local addresses can be assigned to an IPv6 -enabled interface? ✔✔FE80::/10 What would be the interface ID of an IPv6 enabled interface with a MAC address o f 1C-6F-65-
C2-BD-F8 when the interface ID is generated by using the EUI -64 process? ✔✔1E6F:65FF:FEC2:BDF8 An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID spa ce? ✔✔256 Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A? ✔✔BB:BB:BB:BB:BB:BB - Explain:When a host sends information to a distant network, the Layer 2 frame header wil l contain a source and destination MAC address. The source address will be the originating host device. The destination address will be the router interface that connects to the same network. In the case of host A sending information to host B, the source address is AA:AA:AA:AA:AA:AA and the destination address is the MAC address assigned to the R2 Ethernet interface, BB:BB:BB:BB:BB:BB. When a switch configuration includes a user -defined error threshold on a per -port basis, to which switching method will t he switch revert when the error threshold is reached? ✔✔store -and-
forward Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.) ✔✔-Destination IP addresses in a packet header remain cons tant along the entire path to a target host. -Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another. What is one main characteristic of the data link layer? ✔✔It shields the upper layer pro tocol from being aware of the physical medium to be used in the communication. What are three characteristics of the CSMA/CD process? (Choose three.) ✔✔-A device listens and waits until the media is not busy before transmitting. -After detecting a collisi on, hosts can attempt to resume transmission after a random time delay has expired. -All of the devices on a segment see data that passes on the network medium. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) ✔✔-
accessing the media -data encapsulation Which two commands can be used on a Windows host to display the routing table? (Choose two.) ✔✔-netstat -r -route print Explain:On a Windows host, the route print or netstat -r commands can be used to display the host routing table. Both commands generate the same output. On a router, the show ip route command is used to display the routing table. The netstat -s command is used to di splay per -
protocol statistics. The tracert command is used to display the path that a packet travels to its destination. What are two functions that are provided by the network layer? (Choose two.) ✔✔-directing data packets to destination hosts on other n etworks -providing end devices with a unique network identifier Which two statements describe features of an IPv4 routing table on a router? (Choose two.) ✔✔-
Directly connected interfaces will have two route source codes in the routing table: C and S. -If a default static route is configured in the router, an entry will be included in the routing table with source code S. How does the service password -encryption command enhance password security on Cisco routers and switches? ✔✔-It encrypts passwords tha t are stored in router or switch configuration files. Why would a Layer 2 switch need an IP address? ✔✔to enable the switch to be managed remotely What characteristic describes identity theft? ✔✔the use of stolen credentials to access private data

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BrilliantScores Chamberlain College Of Nursng
View profile
Follow You need to be logged in order to follow users or courses
Sold
2817
Member since
3 year
Number of followers
2233
Documents
16100
Last sold
5 days ago
latest updated documents, correct, verified & graded A study materials

get bundles, documents, test banks, case studies, shadow health's, ATIs, HESIs, study guides, summary, assignments & every kind of study materials.

3.8

774 reviews

5
388
4
117
3
116
2
37
1
116

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions