Chapter 5-8 Flashcards

1
Q

what layers does ethernet function

A

data link/physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what standard specifies the ethernet MAC sublayer functionality in a computer NIC

A

IEEE 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name given to ethernet sublayer PDU

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

functions associated with data encapsulation at ethernet mac sublayer

A

frame delimiting
addressing
error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what happens when a data collision occurs on the ethernet bus

A

all devices stop transmitting and try again later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is true about the ethernet mac address

A

first 6 hexadecimal digits of MAC address represent the OUI
vendor responsible for assigning the last 24 bits of mac address
also known as burned-in address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

minimum/maximum ethernet frame size as defined by IEEE 802.3

A

64-1518

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which field in an ethernet frame is used for error detection

A

frame check sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which address is used as a destination address on a broadcast
Ethernet frame

A

FF-FF-FF-FF-FF-FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which address is a multicast MAC address?

A

B. 01-00-5E-00-00-C8

- Multicast MAC address associated with an IPV4 multicast address is a special value that begins with 01-00-5E in hexadecimal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What functions are provided by the ARP process? (Choose two.)

A

resolving ipv4 addresses to mac addresses
maintaining a table of mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which devices on a network will receive an ARP request?

A

all devices in L2 broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When ARP receives a request to map an
IPv4 address to a MAC address, it first looks in its _____. If no entry is
found, ARP will send out an _____.

A

ARP table/ARP cache.
ARP request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a device receives an ARP request for a device with a different IP address, it will use the ____ information to update its ARP table and then it will ____ the packet.

A

source
drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP ___ are sent to a broadcast MAC
address, and ARP replies are sent to a ___ MAC address.

A

requests
unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a switch receives a broadcast frame it enters the source information in its ______ and then it floods the frame to all ports except for the one the frame was _____

A

MAC address table
Received on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MAC address table is sometimes referred to as a ____ table because it is stored in _____ memory

A

CAM
content addressable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of switching is used on L2 switches to allow qos

A

Store and forward
Fragment free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If source and destination ipv4 addresses are on the same network the destination MAC address will be that of which device

A

Same device as the destination ipv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Which layer of the OSI model is concerned with end-to-end
    communication over the network?
A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is associated with the network layer?

A

ip address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why was IPv4 designed as a connectionless protocol?

A
  • IP is connectionless, which greatly reduces the overhead of IP.
  • Therefore, there is no initial exchange of control information before
    packets are forwarded, and no additional fields exist in the header to
    maintain an established connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

On a router, what field in an IPv4 header should be examined to
determine that the maximum number of hops has been reached by the
packet on its way from the source to this destination?

24
Q

When configuring a host, the gateway was not configured. How will
this affect communication to and from this device?

A

. Communication will be limited to hosts in the local network.

25
In what part of a router is the running configuration being used located?
RAM
26
During the boot process of a Cisco router, you notice a series of hash symbols (#) appearing on the terminal emulator screen from the console session. In what phase is the boot process?
loading the IOS
27
What are the required steps for configuring an interface on a router? (Choose two.)
provide layer 3 addressing activate the interface
28
The ip default-gateway command was not used when configuring a switch. How will this affect network communication? (Choose two.)
A. Host communication through the switch will not be affected. E. Communication to and from the switch will be limited to hosts in the local network.
29
When using the netstat -r command on a host, you see a route 0.0.0.0 0.0.0.0. What does this route represent?
Destinations without a specified route are forwarded to the gateway.
30
1. What are the parts of an IPv4 address? (Choose two.)
host network
31
What is the purpose of the network address?
to refer to a network
32
What are characteristics in common among unicast, broadcast, and multicast IPv4 communication? (Choose two.)
source address is always unicast never multiple destination addresses in the header
33
Which of the following IPv4 addresses would be used in a private network?
192 / 172 /10
34
What is the principal reason for the development of IPv6?
to overcome the problem of IPv4 address exhaustion
35
How are IPv6 addresses represented?
. 8 hextets separated by colons
36
What type of IPv6 address should be used for communication that is limited to a single network segment?
link local
37
What methods automatically provide IPv6 global unicast addresses? (Choose two.)
A. SLAAC B. Stateful DHCPv6
38
Which type of IPv4 address allows a host to send a message to a group of hosts?
multicast
39
. What protocol is used in IP networks to verify connectivity?
ICMP (v4 v6)
40
. What utility is used to identify network path between hosts?
traceroute
41
1. What are advantages of subnetting a large network? (Choose two.)
B. Overall network traffic is reduced. D. Network performance is improved.
42
What device would permit hosts on different subnets to be able to communicate?
router
43
To create subnets, bits are borrowed from the _____ portion of an IP address.
host
44
. How many subnets can be created if 4 bits are borrowed to specify subnets?
16
45
What best describes a network broadcast address?
All 1 bits in the host portion of the address
46
How many valid host addresses are created when 4 host bits are borrowed from the 10.20.20.0/24 network?
14
47
A junior network technician has subnetted the 10.20.30.0/24 address space by borrowing 3 bits. The technician decides to use the second subnet for the Accounting department computers. Which of the following addresses could the network technician assign to hosts? (Choose three.)
D. 10.20.30.33/27 E. 10.20.30.34/27 F. 10.20.30.35/27
48
A junior network technician is assigning host addresses to devices in the 192.168.1.0/25 subnet. The departmental printer is assigned the address 192.168.1.131/25 with a 192.168.1.1/25 default gateway. No one in the department is able to print. What is the cause of the problem?
. The printer has been assigned an address on another subnet.
49
A new department has been established with 511 hosts that require addresses. Currently the company uses the 10.20.0.0/16 address space. How many bits must the network administrator borrow to provide addresses for this subnet without wasting addresses?
6
50
A network technician borrows 5 bits from the 10.0.0.0/16 network to create subnets. What is the subnet mask that should be associated with each of the newly created subnets?
. 255.255.248.0
51
____ provides a more efficient IP address allocation by allowing the use of different-size subnets in the same network.
VLSM
52
. A network administrator has borrowed 3 bits from the 10.20.0.0/25 network to create subnets. The administrator then decided to use the first subnet for point-to-point serial WAN connections each requiring two addresses. How many WAN connections can the administrator address using only the first subnet if he is using VLSM?
4
53
A network administrator has decided to use VLSM to subnet the 10.11.0.0/20 network to provide addresses for two new departments and the point-to-point link that separates the two departments. The first department has 796 users and the second department has 31 users. The WAN link requires only two addresses. Which of the following subnets will provide the required contiguous space and waste the fewest addresses? (Choose three.)
B. 10.11.0.0/22 D. 10.11.253.0/26 F. 10.11.253.64/30
54
What is the primary purpose of subnetting an IPv6 address space? (Choose two.)
B. Support hierarchical network design C. Manage network traffic
55
15. What is the most common process to subnet an IPv6 network?
A. Use the range of hexadecimal values in the subnet ID