5-9 NETWORKING Flashcards

1
Q
  1. At which layers of the OSI model does Ethernet function? (Choose
    two.)
A

F. Data link
G. Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which standard specifies the Ethernet MAC sublayer functionality in
    a computer NIC?
A

B. IEEE 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What is the name given to the Ethernet MAC sublayer PDU?
A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What are the primary functions associated with data encapsulation at
    the Ethernet MAC sublayer? (Choose three.)
A

B. Frame delimiting
C. Addressing
E. Error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What happens when a data collision occurs on an Ethernet bus?
A

B. All devices stop transmitting and try again later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is true about the Ethernet MAC address? (Choose three.)
A

D. The vendor is responsible for assigning the last 24 bits of the MAC
address.
B. The first 6 hexadecimal digits of a MAC address represent the OUI.
E. The MAC address is also known as a burned-in address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the minimum and maximum Ethernet frame size as defined
by IEEE 802.3?

A

A. 64 bytes – 1518 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which field in an Ethernet frame is used for error detection?
A

D. Frame Check Sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which address is used as a destination address on a broadcast
Ethernet frame?

A

C. FF-FF-FF-FF-FF-FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which address is a multicast MAC address?

A

B. 01-00-5E-00-00-C8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What functions are provided by the ARP process? (Choose two.)
A

A. Resolving IPv4 addresses to MAC addresses
C. Maintaining a table of mappings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which devices on a network will receive an ARP request?

A

B. All devices in the L2 broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blanks. When ARP receives a request to map an
IPv4 address to a MAC address, it first looks in its _____. If no entry is
found, ARP will send out an ARP_____.

A

arp table
request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a device receives an ARP request for a device with a different IP address, it will use the __ information to update its ARP table and then it will _____ the packet

A

source
drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP _____ are sent to a broadcast MAC
address, and ARP replies are sent to a _____ MAC address.

A

requests
unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a switch receives a broadcast
frame, it enters the source information in its _____ and then it _____
the frame to all ports except the one the frame was _____ on.

A

mac address table
floods
received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The MAC address table is sometimes
referred to as a ____ table because it is stored in _____ memory.

A

cam
content addressable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. What type of switching is used on current L2 switches to allow QoS?
A

store nd forward
fragment free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If the source and destination IPv4 addresses are on the same network,
the destination MAC address will be that of which device

A

A. The same device as the destination IPv4 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If the source and destination IPv4 addresses are on different
networks, the destination MAC address will be that of which device?

A

B. The default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Which layer of the OSI model is concerned with end-to-end
    communication over the network?
A

A. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Which of the following is associated with the network layer?
A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Why was IPv4 designed as a connectionless protocol?
A

IP is connectionless, which greatly reduces the overhead of IP.
Therefore, there is no initial exchange of control information before
packets are forwarded, and no additional fields exist in the header to maintain an established connection

24
Q
  1. On a router, what field in an IPv4 header should be examined to
    determine that the maximum number of hops has been reached by the
    packet on its way from the source to this destination?
25
5. When configuring a host, the gateway was not configured. How will this affect communication to and from this device?
C. Communication will be limited to hosts in the local network.
26
. In what part of a router is the running configuration being used located?
RAM
27
7. During the boot process of a Cisco router, you notice a series of hash symbols (#) appearing on the terminal emulator screen from the console session. In what phase is the boot process?
B. Loading the IOS
28
What are the required steps for configuring an interface on a router?
Provide Layer 3 addressing info activate the interface
29
The ip default-gateway command was not used when configuring a switch. How will this affect network communication?
A. Host communication through the switch will not be affected. E. Communication to and from the switch will be limited to hosts in the local network.
30
10. When using the netstat -r command on a host, you see a route 0.0.0.0 0.0.0.0. What does this route represent?
C. Destinations without a specified route are forwarded to the gateway.
31
. What are the parts of an IPv4 address? (Choose two.)
A. Host B. Network
32
2. What is the purpose of the network address?
B. To refer to a network
33
3. What are characteristics in common among unicast, broadcast, and multicast IPv4 communication? (Choose two.)
A. The source address is always a unicast address. C. There are never multiple destination addresses in the header.
34
. Which of the following IPv4 addresses would be used in a private network?
D. 192.168.1.1
35
5. What is the principal reason for the development of IPv6?
overcome ipv4 exhaustion
36
6. How are IPv6 addresses represented?
C. 8 hextets separated by colons
37
7. What type of IPv6 address should be used for communication that is limited to a single network segment?
B. Link-local
38
8. What methods automatically provide IPv6 global unicast addresses? (Choose two.)
A. SLAAC B. Stateful DHCPv6
39
9. Which type of IPv4 address allows a host to send a message to a group of hosts?
C. Multicast
40
What protocol is used in IP networks to verify connectivity?
ICMP protocol
41
What utility is used to identify network path between hosts?
D. Traceroute
42
1. What are advantages of subnetting a large network? (Choose two.)
B. Overall network traffic is reduced. D. Network performance is improved.
43
What device would permit hosts on different subnets to be able to communicate?
C. Router
44
To create subnets, bits are borrowed from the ____ portion of an IP address
host
45
. How many subnets can be created if 4 bits are borrowed to specify subnets?
16
46
What best describes a network broadcast address?
D. All 1 bits in the host portion of the address
47
. How many valid host addresses are created when 4 host bits are borrowed from the 10.20.20.0/24 network?
C. 14
48
A junior network technician has sub netted the 10.20.30.0/24 address space by borrowing 3 bits. The technician decides to use the second subnet for the Accounting department computers. Which of the following addresses could the network technician assign to hosts? (Choose three.)
D. 10.20.30.33/27 E. 10.20.30.34/27 F. 10.20.30.35/27
49
A junior network technician is assigning host addresses to devices in the 192.168.1.0/25 subnet. The departmental printer is assigned the address 192.168.1.131/25 with a 192.168.1.1/25 default gateway. No one in the department is able to print. What is the cause of the problem?
C. The printer has been assigned an address on another subnet.
50
A new department has been established with 511 hosts that require addresses. Currently the company uses the 10.20.0.0/16 address space. How many bits must the network administrator borrow to provide addresses for this subnet without wasting addresses?
B. 6
51
A network technician borrows 5 bits from the 10.0.0.0/16 network to create subnets. What is the subnet mask that should be associated with each of the newly created subnets?
C. 255.255.248.0
52
____ provides a more efficient IP address allocation by allowing the use of different-size subnets in the same network
VLSM
53
A network administrator has borrowed 3 bits from the 10.20.0.0/25 network to create subnets. The administrator then decided to use the first subnet for point-to-point serial WAN connections each requiring two addresses. How many WAN connections can the administrator address using only the first subnet if he is using VLSM?
4
54
A network administrator has decided to use VLSM to subnet the 10.11.0.0/20 network to provide addresses for two new departments and the point-to-point link that separates the two departments. The first department has 796 users and the second department has 31 users. The WAN link requires only two addresses. Which of the following subnets will provide the required contiguous space and waste the fewest addresses? (Choose three.)
10.11.0.0/22 D. 10.11.253.0/26 F. 10.11.253.64/30
55
What is the primary purpose of subnetting an IPv6 address space?
B. Support hierarchical network design C. Manage network traffic
56
What is the most common process to subnet an IPv6 network?
A. Use the range of hexadecimal values in the subnet ID