Chapter 5-8 Flashcards

1
Q

what layers does ethernet function

A

data link/physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what standard specifies the ethernet MAC sublayer functionality in a computer NIC

A

IEEE 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name given to ethernet sublayer PDU

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

functions associated with data encapsulation at ethernet mac sublayer

A

frame delimiting
addressing
error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what happens when a data collision occurs on the ethernet bus

A

all devices stop transmitting and try again later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is true about the ethernet mac address

A

first 6 hexadecimal digits of MAC address represent the OUI
vendor responsible for assigning the last 24 bits of mac address
also known as burned-in address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

minimum/maximum ethernet frame size as defined by IEEE 802.3

A

64-1518

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which field in an ethernet frame is used for error detection

A

frame check sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which address is used as a destination address on a broadcast
Ethernet frame

A

FF-FF-FF-FF-FF-FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which address is a multicast MAC address?

A

B. 01-00-5E-00-00-C8

- Multicast MAC address associated with an IPV4 multicast address is a special value that begins with 01-00-5E in hexadecimal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What functions are provided by the ARP process? (Choose two.)

A

resolving ipv4 addresses to mac addresses
maintaining a table of mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which devices on a network will receive an ARP request?

A

all devices in L2 broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When ARP receives a request to map an
IPv4 address to a MAC address, it first looks in its _____. If no entry is
found, ARP will send out an _____.

A

ARP table/ARP cache.
ARP request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a device receives an ARP request for a device with a different IP address, it will use the ____ information to update its ARP table and then it will ____ the packet.

A

source
drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP ___ are sent to a broadcast MAC
address, and ARP replies are sent to a ___ MAC address.

A

requests
unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a switch receives a broadcast frame it enters the source information in its ______ and then it floods the frame to all ports except for the one the frame was _____

A

MAC address table
Received on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MAC address table is sometimes referred to as a ____ table because it is stored in _____ memory

A

CAM
content addressable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of switching is used on L2 switches to allow qos

A

Store and forward
Fragment free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If source and destination ipv4 addresses are on the same network the destination MAC address will be that of which device

A

Same device as the destination ipv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Which layer of the OSI model is concerned with end-to-end
    communication over the network?
A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is associated with the network layer?

A

ip address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why was IPv4 designed as a connectionless protocol?

A
  • IP is connectionless, which greatly reduces the overhead of IP.
  • Therefore, there is no initial exchange of control information before
    packets are forwarded, and no additional fields exist in the header to
    maintain an established connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

On a router, what field in an IPv4 header should be examined to
determine that the maximum number of hops has been reached by the
packet on its way from the source to this destination?

A

TTL

24
Q

When configuring a host, the gateway was not configured. How will
this affect communication to and from this device?

A

. Communication will be limited to hosts in the local network.

25
Q

In what part of a router is the running configuration being used
located?

A

RAM

26
Q

During the boot process of a Cisco router, you notice a series of hash symbols (#) appearing on the terminal emulator screen from the console session. In what phase is the boot process?

A

loading the IOS

27
Q

What are the required steps for configuring an interface on a router?
(Choose two.)

A

provide layer 3 addressing
activate the interface

28
Q

The ip default-gateway command was not used when
configuring a switch. How will this affect network communication?
(Choose two.)

A

A. Host communication through the switch will not be affected.

E. Communication to and from the switch will be limited to hosts in
the local network.

29
Q

When using the netstat -r command on a host, you see a route
0.0.0.0 0.0.0.0. What does this route represent?

A

Destinations without a specified route are forwarded to the gateway.

30
Q
  1. What are the parts of an IPv4 address? (Choose two.)
A

host
network

31
Q

What is the purpose of the network address?

A

to refer to a network

32
Q

What are characteristics in common among unicast, broadcast, and
multicast IPv4 communication? (Choose two.)

A

source address is always unicast
never multiple destination addresses in the header

33
Q

Which of the following IPv4 addresses would be used in a private
network?

A

192 / 172 /10

34
Q

What is the principal reason for the development of IPv6?

A

to overcome the problem of IPv4 address exhaustion

35
Q

How are IPv6 addresses represented?

A

. 8 hextets separated by colons

36
Q

What type of IPv6 address should be used for communication that is
limited to a single network segment?

A

link local

37
Q

What methods automatically provide IPv6 global unicast addresses?
(Choose two.)

A

A. SLAAC
B. Stateful DHCPv6

38
Q

Which type of IPv4 address allows a host to send a message to a
group of hosts?

A

multicast

39
Q

. What protocol is used in IP networks to verify connectivity?

A

ICMP (v4 v6)

40
Q

. What utility is used to identify network path between hosts?

A

traceroute

41
Q
  1. What are advantages of subnetting a large network? (Choose two.)
A

B. Overall network traffic is reduced.

D. Network performance is improved.

42
Q

What device would permit hosts on different subnets to be able to
communicate?

A

router

43
Q

To create subnets, bits are borrowed from the _____
portion of an IP address.

A

host

44
Q

. How many subnets can be created if 4 bits are borrowed to specify
subnets?

A

16

45
Q

What best describes a network broadcast address?

A

All 1 bits in the host portion of the address

46
Q

How many valid host addresses are created when 4 host bits are
borrowed from the 10.20.20.0/24 network?

A

14

47
Q

A junior network technician has subnetted the 10.20.30.0/24 address
space by borrowing 3 bits. The technician decides to use the second
subnet for the Accounting department computers. Which of the
following addresses could the network technician assign to hosts?
(Choose three.)

A

D. 10.20.30.33/27
E. 10.20.30.34/27
F. 10.20.30.35/27

48
Q

A junior network technician is assigning host addresses to devices in
the 192.168.1.0/25 subnet. The departmental printer is assigned the
address 192.168.1.131/25 with a 192.168.1.1/25 default gateway. No
one in the department is able to print. What is the cause of the problem?

A

. The printer has been assigned an address on another subnet.

49
Q

A new department has been established with 511 hosts that require
addresses. Currently the company uses the 10.20.0.0/16 address space.
How many bits must the network administrator borrow to provide
addresses for this subnet without wasting addresses?

A

6

50
Q

A network technician borrows 5 bits from the 10.0.0.0/16 network to
create subnets. What is the subnet mask that should be associated with
each of the newly created subnets?

A

. 255.255.248.0

51
Q

____ provides a more efficient IP address allocation
by allowing the use of different-size subnets in the same network.

A

VLSM

52
Q

. A network administrator has borrowed 3 bits from the 10.20.0.0/25
network to create subnets. The administrator then decided to use the
first subnet for point-to-point serial WAN connections each requiring
two addresses. How many WAN connections can the administrator
address using only the first subnet if he is using VLSM?

A

4

53
Q

A network administrator has decided to use VLSM to subnet the
10.11.0.0/20 network to provide addresses for two new departments
and the point-to-point link that separates the two departments. The first
department has 796 users and the second department has 31 users. The
WAN link requires only two addresses. Which of the following subnets
will provide the required contiguous space and waste the fewest
addresses? (Choose three.)

A

B. 10.11.0.0/22

D. 10.11.253.0/26
F. 10.11.253.64/30

54
Q

What is the primary purpose of subnetting an IPv6 address space?
(Choose two.)

A

B. Support hierarchical network design
C. Manage network traffic

55
Q
  1. What is the most common process to subnet an IPv6 network?
A

A. Use the range of hexadecimal values in the subnet ID