CCNA 1: INTRODUCTION TO
NETWORKS V7.0 EXAM QUESTIONS
AND ANSWERS
What two ICMPv6 message types must be permitted through IPv6 access control lists
to allow resolution of Layer 3 addresses to Layer 2 MAC addresses?
neighbor solicitations
echo requests
neighbor advertisements
echo replies
router solicitations
router advertisements - Correct Answers -1) neighbor solicitations
2) neighbor advertisements
Which range of link-local addresses can be assigned to an IPv6-enabled interface?
FEC0::/10
FDEE::/7
FE80::/10
FF00::/8 - Correct Answers -FE80::/10
Link-local addresses are in the range of FE80::/10 to FEBF::/10.
The original IPv6 specification defined site-local addresses and used the prefix range
FEC0::/10, but these addresses were deprecated by the IETF in favor of unique local
addresses.
FDEE::/7 is a unique local address because it is in the range of FC00::/7 to FDFF::/7.
IPv6 multicast addresses have the prefix FF00::/8.
What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-
6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?
0C6F:65FF:FEC2:BDF8
1E6F:65FF:FEC2:BDF8
C16F:65FF:FEC2:BDF8
106F:65FF:FEC2:BDF8 - Correct Answers -1E6F:65FF:FEC2:BDF8
,To derive the EUI-64 interface ID by using the MAC address 1C-6F-65-C2-BD-F8, three
steps are taken.
Change the seventh bit of the MAC address from a binary 0 to a binary 1 which
changes the hex C, into a hex E.
Insert hex digits FFFE into the middle of the address.
Rewrite the address in IPv6 format.
The three steps, when complete, give the interface ID of 1E6F:65FF:FEC2:BDF8.
An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56.
How many subnets can be created without using bits in the interface ID space?
256
512
1024
4096 - Correct Answers -256
Refer to the exhibit.
If host A sends an IP packet to host B, what will the destination address be in the frame
when it leaves host A?
DD:DD:DD:DD:DD:DD
172.168.10.99
CC:CC:CC:CC:CC:CC
172.168.10.65
BB:BB:BB:BB:BB:BB
AA:AA:AA:AA:AA:AA - Correct Answers -BB:BB:BB:BB:BB:BB
When a host sends information to a distant network, the Layer 2 frame header will
contain a source and destination MAC address.
The source address will be the originating host device. The destination address will be
the router interface that connects to the same network.
In the case of host A sending information to host B, the source address is
AA:AA:AA:AA:AA:AA and the destination address is the MAC address assigned to the
R2 Ethernet interface, BB:BB:BB:BB:BB:BB.
When a switch configuration includes a user-defined error threshold on a per-port basis,
to which switching method will the switch revert when the error threshold is reached?
,cut-through
store-and-forward
fast-forward
fragment-free - Correct Answers -store-and-forward
Which two statements are correct about MAC and IP addresses during data
transmission if NAT is not involved?
* Destination IP addresses in a packet header remain constant along the entire path to
a target host.
* Destination MAC addresses will never change in a frame that goes across seven
routers.
* Every time a frame is encapsulated with a new destination MAC address, a new
destination IP address is needed.
* Destination and source MAC addresses have local significance and change every time
a frame goes from one LAN to another.
* A packet that has crossed four routers has changed the destination IP address four
times. - Correct Answers -1) Destination IP addresses in a packet header remain
constant along the entire path to a target host.
2) Destination and source MAC addresses have local significance and change every
time a frame goes from one LAN to another.
What is one main characteristic of the data link layer?
* It generates the electrical or optical signals that represent the 1 and 0 on the media.
* It converts a stream of data bits into a predefined code.
* It shields the upper layer protocol from being aware of the physical medium to be used
in the communication.
* It accepts Layer 3 packets and decides the path by which to forward the packet to a
remote network. - Correct Answers -It shields the upper layer protocol from being aware
of the physical medium to be used in the communication.
What are three characteristics of the CSMA/CD process?
* The device with the electronic token is the only one that can transmit after a collision.
* A device listens and waits until the media is not busy before transmitting.
, * After detecting a collision, hosts can attempt to resume transmission after a random
time delay has expired.
* All of the devices on a segment see data that passes on the network medium.
* A jam signal indicates that the collision has cleared and the media is not busy.
* Devices can be configured with a higher transmission priority. - Correct Answers -1) A
device listens and waits until the media is not busy before transmitting.
2) After detecting a collision, hosts can attempt to resume transmission after a random
time delay has expired.
3) All of the devices on a segment see data that passes on the network medium.
The Carrier Sense Multiple Access/Collision Detection (CSMA/CD) process is a
contention-based media access control mechanism used on shared media access
networks, such as Ethernet.
When a device needs to transmit data, it listens and waits until the media is available
(quiet), then it will send data.
If two devices transmit at the same time, a collision will occur.
Both devices will detect the collision on the network. When a device detects a collision,
it will stop the data transmission process, wait for a random amount of time, then try
again.
What are two primary responsibilities of the Ethernet MAC sublayer?
error detection
frame delimiting
accessing the media
data encapsulation
logical addressing - Correct Answers -1) accessing the media
2) data encapsulation
Which two commands can be used on a Windows host to display the routing table?
netstat -s
route print
show ip route
netstat -r
tracert - Correct Answers -1) route print
NETWORKS V7.0 EXAM QUESTIONS
AND ANSWERS
What two ICMPv6 message types must be permitted through IPv6 access control lists
to allow resolution of Layer 3 addresses to Layer 2 MAC addresses?
neighbor solicitations
echo requests
neighbor advertisements
echo replies
router solicitations
router advertisements - Correct Answers -1) neighbor solicitations
2) neighbor advertisements
Which range of link-local addresses can be assigned to an IPv6-enabled interface?
FEC0::/10
FDEE::/7
FE80::/10
FF00::/8 - Correct Answers -FE80::/10
Link-local addresses are in the range of FE80::/10 to FEBF::/10.
The original IPv6 specification defined site-local addresses and used the prefix range
FEC0::/10, but these addresses were deprecated by the IETF in favor of unique local
addresses.
FDEE::/7 is a unique local address because it is in the range of FC00::/7 to FDFF::/7.
IPv6 multicast addresses have the prefix FF00::/8.
What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-
6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?
0C6F:65FF:FEC2:BDF8
1E6F:65FF:FEC2:BDF8
C16F:65FF:FEC2:BDF8
106F:65FF:FEC2:BDF8 - Correct Answers -1E6F:65FF:FEC2:BDF8
,To derive the EUI-64 interface ID by using the MAC address 1C-6F-65-C2-BD-F8, three
steps are taken.
Change the seventh bit of the MAC address from a binary 0 to a binary 1 which
changes the hex C, into a hex E.
Insert hex digits FFFE into the middle of the address.
Rewrite the address in IPv6 format.
The three steps, when complete, give the interface ID of 1E6F:65FF:FEC2:BDF8.
An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56.
How many subnets can be created without using bits in the interface ID space?
256
512
1024
4096 - Correct Answers -256
Refer to the exhibit.
If host A sends an IP packet to host B, what will the destination address be in the frame
when it leaves host A?
DD:DD:DD:DD:DD:DD
172.168.10.99
CC:CC:CC:CC:CC:CC
172.168.10.65
BB:BB:BB:BB:BB:BB
AA:AA:AA:AA:AA:AA - Correct Answers -BB:BB:BB:BB:BB:BB
When a host sends information to a distant network, the Layer 2 frame header will
contain a source and destination MAC address.
The source address will be the originating host device. The destination address will be
the router interface that connects to the same network.
In the case of host A sending information to host B, the source address is
AA:AA:AA:AA:AA:AA and the destination address is the MAC address assigned to the
R2 Ethernet interface, BB:BB:BB:BB:BB:BB.
When a switch configuration includes a user-defined error threshold on a per-port basis,
to which switching method will the switch revert when the error threshold is reached?
,cut-through
store-and-forward
fast-forward
fragment-free - Correct Answers -store-and-forward
Which two statements are correct about MAC and IP addresses during data
transmission if NAT is not involved?
* Destination IP addresses in a packet header remain constant along the entire path to
a target host.
* Destination MAC addresses will never change in a frame that goes across seven
routers.
* Every time a frame is encapsulated with a new destination MAC address, a new
destination IP address is needed.
* Destination and source MAC addresses have local significance and change every time
a frame goes from one LAN to another.
* A packet that has crossed four routers has changed the destination IP address four
times. - Correct Answers -1) Destination IP addresses in a packet header remain
constant along the entire path to a target host.
2) Destination and source MAC addresses have local significance and change every
time a frame goes from one LAN to another.
What is one main characteristic of the data link layer?
* It generates the electrical or optical signals that represent the 1 and 0 on the media.
* It converts a stream of data bits into a predefined code.
* It shields the upper layer protocol from being aware of the physical medium to be used
in the communication.
* It accepts Layer 3 packets and decides the path by which to forward the packet to a
remote network. - Correct Answers -It shields the upper layer protocol from being aware
of the physical medium to be used in the communication.
What are three characteristics of the CSMA/CD process?
* The device with the electronic token is the only one that can transmit after a collision.
* A device listens and waits until the media is not busy before transmitting.
, * After detecting a collision, hosts can attempt to resume transmission after a random
time delay has expired.
* All of the devices on a segment see data that passes on the network medium.
* A jam signal indicates that the collision has cleared and the media is not busy.
* Devices can be configured with a higher transmission priority. - Correct Answers -1) A
device listens and waits until the media is not busy before transmitting.
2) After detecting a collision, hosts can attempt to resume transmission after a random
time delay has expired.
3) All of the devices on a segment see data that passes on the network medium.
The Carrier Sense Multiple Access/Collision Detection (CSMA/CD) process is a
contention-based media access control mechanism used on shared media access
networks, such as Ethernet.
When a device needs to transmit data, it listens and waits until the media is available
(quiet), then it will send data.
If two devices transmit at the same time, a collision will occur.
Both devices will detect the collision on the network. When a device detects a collision,
it will stop the data transmission process, wait for a random amount of time, then try
again.
What are two primary responsibilities of the Ethernet MAC sublayer?
error detection
frame delimiting
accessing the media
data encapsulation
logical addressing - Correct Answers -1) accessing the media
2) data encapsulation
Which two commands can be used on a Windows host to display the routing table?
netstat -s
route print
show ip route
netstat -r
tracert - Correct Answers -1) route print