CCNA - ICND1

Card Set Information

Author:
mportales
ID:
274235
Filename:
CCNA - ICND1
Updated:
2014-06-26 10:21:40
Tags:
ICND1 Cisco Exam
Folders:

Description:
Sample questions from ICND1 test prep
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user mportales on FreezingBlue Flashcards. What would you like to do?


  1. Which three statements are true about the operation of a full-duplex Ethernet network? (Choose
    three.)

    A. There are no collisions in full-duplex mode.
    B. A dedicated switch port is required for each full-duplex node.
    C. Ethernet hub ports are preconfigured for full-duplex mode.
    D. In a full-duplex environment, the host network card must check for the availability of the network
    media before transmitting.
    E. The host network card and the switch port must be capable of operating in full-duplex mode.
    • Answer: A,B,E
    • Explanation: Explanation/Reference:
    • Half-duplex Ethernet is defined in the original 802.3 Ethernet and Cisco says you only use one
    • wire pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernet—typically 10BaseT—is only about 30 to 40 percent efficient as Cisco sees it, because a large 10BaseT network will usually only give you 3- to 4Mbps—at most.

    Full-duplex Ethernet uses two pairs of wires, instead of one wire pair like half duplex. Also, full duplex uses a point-to-point connection between the transmitter of the transmitting device and the receiver of the receiving device, which means that with full-duplex data transfer, you get a faster data transfer compared to half duplex. And because the transmitted data is sent on a different set of wires than the received data, no collisions occur. The reason you don’t need to worry about collisions is because now Full-duplex Ethernet is like a freeway with multiple lanes instead of the single-lane road provided by half duplex. Full-duplex Ethernet is supposed to offer 100 percent efficiency in both directions; this means you can get 20Mbps with a 10Mbps Ethernet running full duplex, or 200Mbps for FastEthernet.
  2. Which OSI layer header contains the address of a destination host that is on another network?

    A. application
    B. session
    C. transport
    D. network
    E. data link
    F. physical
    • Answer: D
    • Explanation: Explanation/Reference:
    • Only network address contains this information. To transmit the packets the sender uses network address and datalink address. But the layer 2 address represents just the address of the next hop device on the way to the sender. It is changed on each hop. Network address remains the same.
  3. Which layer of the TCP/IP stack combines the OSI model physical and data link layers?

    A. Internet layer
    B. transport layer
    C. application layer
    D. network access layer
    • Answer: D
    • Explanation: Explanation/Reference:
    • The Internet Protocol Suite, TCP/IP, is a suite of protocols used for communication over the
    • internet. The TCP/ IP model was created after the OSI 7 layer model for two major reasons. First, the foundation of the Internet was built using the TCP/IP suite and through the spread of the World Wide Web and Internet, TCP/IP has been preferred. Second, a project researched by the
    • Department of Defense (DOD) consisted of creating the TCP/IP protocols. The DOD's goal was to bring international standards which could not be met by the OSI model.

    Since the DOD was the largest software consumer and they preferred the TCP/IP suite, most vendors used this model rather then the OSI. Below is a side by side comparison of the TCP/IP and OSI models.
  4. Which protocol uses a connection-oriented service to deliver files between end systems?

    A. TFTP
    B. DNS
    C. FTP
    D. SNMP
    E. RIP
    • Answer: C
    • Explanation: Explanation/Reference:
    • FTP is an acronym for File Transfer Protocol. As the name suggests, FTP is used to transfer files between computers on a network. You can use FTP to exchange files between computer accounts, transfer files between an account and a desktop computer, or access online software archives
  5. If hubs were replaced by switches, what would be virtually eliminated?

    A. broadcast domains
    B. repeater domains
    C. Ethernet collisions
    D. signal amplification
    E. Ethernet broadcasts
    • Answer: C Ethernet collisions
    • Explanation: Explanation/Reference:
    • Modern wired networks use a network switch to eliminate collisions. By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links.
  6. Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?

    A. HTTP
    B. IP
    C. TCP
    D. Telnet
    E. UDP
    • Answer: E
    • Explanation: Explanation/Reference:
    • UDP provides a connectionless datagram service that offers best-effort delivery, which means that UDP does not guarantee delivery or verify sequencing for any datagrams. A source host that needs reliable communication must use either TCP or a program that provides its own sequencing and acknowledgment services.
  7. Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?

    A. Physical
    B. Data-link
    C. Transport
    D. Network
    • Answer: C
    • Layer: Transport (Layer 4)
    • Function: Provides reliable or best effort delivery and (optional) error and flow control.
    • Examples: TCP/UDP
  8. Which statements are true regarding ICMP packets? (Choose two.)

    A. They acknowledge receipt of TCP segments.
    B. They guarantee datagram delivery.
    C. TRACERT uses ICMP packets.
    D. They are encapsulated within IP datagrams.
    E. They are encapsulated within UDP datagrams.
    • Answer: C,D
    • Explanation: Explanation/Reference:
    • Ping may be used to find out whether the local machines are connected to the network or whether a remote site is reachable. This tool is a common network tool for determining the network connectivity which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usually associated with the network management tools which provide network information to network administrators, such as ping and traceroute (the later also uses the UDP/IP protocol).
    • ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports are included in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are not applicable. Fortunately, a special "signature" known as the packet’s Message type is included for denoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3, 4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect, echo request, time exceeded, and parameter problem respectively. In the ping service, after receiving the ICMP "echo request" packet from the source location, the destination
  9. Which statements accurately describe CDP? (Choose three.)

    A. CDP is an IEEE standard protocol.
    B. CDP is a Cisco proprietary protocol.
    C. CDP is a datalink layer protocol.
    D. CDP is a network layer protocol.
    E. CDP can discover directly connected neighboring Cisco devices.
    F. CDP can discover Cisco devices that are not directly connected.
    • Answer: B,C,E
    • Explanation: Explanation/Reference:
    • CDP (Cisco Discovery Protocol) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices containing useful info for troubleshooting and documenting the network.
  10. How does a switch differ from a hub?

    A. A switch does not induce any latency into the frame transfer time.
    B. A switch tracks MAC addresses of directly-connected devices.
    C. A switch operates at a lower, more efficient layer of the OSI model.
    D. A switch decreases the number of broadcast domains.
    E. A switch decreases the number of collision domains.
    • Answer: B
    • Explanation: Explanation/Reference:
    • Some of the features and functions of a switch include:
    • A switch is essentially a fast, multi-port bridge, which can contain dozens of ports.
    • Rather than creating two collision domains, each port creates its own collision domain.
    • In a network of twenty nodes, twenty collision domains exist if each node is plugged into its own switch port.
    • If an uplink port is included, one switch creates twenty-one single-node collision domains.
    • A switch dynamically builds and maintains a Content-Addressable Memory (CAM) table, holding all of the necessary MAC information for each port.
  11. What must occur before a workstation can exchange HTTP packets with a web server?

    A. A UDP connection must be established between the workstation and its default gateway.
    B. A UDP connection must be established between the workstation and the web server.
    C. A TCP connection must be established between the workstation and its default gateway.
    D. A TCP connection must be established between the workstation and the web server.

    E. An ICMP connection must be established between the workstation and its default gateway.
    F. An ICMP connection must be established between the workstation and the web server.
    • Answer: D
    • Explanation: Explanation/Reference:
    • HTTP uses TCP port 80.
  12. How does TCP differ from UDP? (Choose two.)

    A. TCP provides best effort delivery.
    B. TCP provides synchronized communication.
    C. TCP segments are essentially datagrams.
    D. TCP provides sequence numbering of packets.
    E. TCP uses broadcast delivery.
    • Answer: B,D
    • Explanation: Explanation/Reference:
    • TCP differs from UDP in the following ways:
    • TCP provides best effort delivery.
    • TCP provides synchronized communication.
    • TCP segments are essentially datagrams.
    • TCP provides sequence numbering of packets.
    • TCP uses broadcast delivery.
  13. Which network device functions only at Layer 1 of the OSI model?

    A. Bridge
    B. Hub
    C. NIC
    D. Router
    E. Switch
    • Answer: B Hub
    • Most hubs are amplifying the electrical signal; therefore, they are really repeaters with severalports. Hubs and repeaters are Layer 1 (physical layer) devices.
  14. What addresses change as a packet transverses a network?

    A. Source and destination MAC addresses
    B. Source and destination IP Addresses
    Although the source and destination MAC address will change as a packet traverses a network, the source and destination IP address will not unless network address translation(NAT) is being done
  15. Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?

    A. HTTP
    B. IP
    C. TCP
    D. Telnet
    E. UDP
    • Answer: E UDP
    • UDP provides a connectionless datagram service that offers best-effort delivery, which means thatUDP does not guarantee delivery or verify sequencing for any datagrams. A source host thatneeds reliable communication must use either TCP or a program that provides its own sequencingand acknowledgment services.
  16. Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?

    A. Physical
    B. Data-link
    C. Transport
    D. Network
    • Answer: C Transport
  17. Which statements are true regarding ICMP packets? (Choose two.)

    A. They acknowledge receipt of TCP segments.
    B. They guarantee datagram delivery.
    C. TRACERT uses ICMP packets.
    D. They are encapsulated within IP datagrams.
    E. They are encapsulated within UDP datagrams.
    • Answer: C,D
    • C. TRACERT uses ICMP packets.
    • D. They are encapsulated within IP datagrams.

    Ping may be used to find out whether the local machines are connected to the network or whethera remote site is reachable. This tool is a common network tool for determining the networkconnectivity which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usuallyassociated with the network management tools which provide network information to networkadministrators, such as ping and traceroute (the later also uses the UDP/IP protocol).ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports areincluded in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are notapplicable. Fortunately, a special "signature" known as the packet’s Message type is included fordenoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3,4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect,echo request, time exceeded, and parameter problem respectively.In the ping service, after receiving the ICMP "echo request" packet from the source location, thedestination
  18. Which statements accurately describe CDP? (Choose three.)
    A. CDP is an IEEE standard protocol.
    B. CDP is a Cisco proprietary protocol.
    C. CDP is a datalink layer protocol.
    D. CDP is a network layer protocol.
    E. CDP can discover directly connected neighboring Cisco devices.
    • Answer: B,C,E
    • CDP (Cisco Discovery Protocol) is a proprietary protocol designed by Cisco to help administratorscollect information about both locally attached and remote devices. By using CDP, you can gatherhardware and protocol information about neighbor devices containing useful info fortroubleshooting and documenting the network.
  19. How does a switch differ from a hub?

    A. A switch does not induce any latency into the frame transfer time.
    B. A switch tracks MAC addresses of directly-connected devices.
    C. A switch operates at a lower, more efficient layer of the OSI model.
    D. A switch decreases the number of broadcast domains.
    E. A switch decreases the number of collision domains.
    • Answer: B
    • Some of the features and functions of a switch include:A switch is essentially a fast, multi-port bridge, which can contain dozens of ports.Rather than creating two collision domains, each port creates its own collision domain.In a network of twenty nodes, twenty collision domains exist if each node is plugged into its own switch port.
    • If an uplink port is included, one switch creates twenty-one single-node collision domains.A switch dynamically builds and maintains a Content-Addressable Memory (CAM) table, holding all of the necessary MAC information for each port.
  20. What must occur before a workstation can exchange HTTP packets with a web server?

    A. A UDP connection must be established between the workstation and its default gateway.
    B. A UDP connection must be established between the workstation and the web server.
    C. A TCP connection must be established between the workstation and its default gateway.
    D. A TCP connection must be established between the workstation and the web server.
    E. An ICMP connection must be established between the workstation and its default gateway.
    F. An ICMP connection must be established between the workstation and the web server.
    • Answer: D
    • HTTP uses TCP port 80.
  21. How does TCP differ from UDP? (Choose two.)

    A. TCP provides best effort delivery.
    B. TCP provides synchronized communication.
    C. TCP segments are essentially datagrams.
    D. TCP provides sequence numbering of packets.
    E. TCP uses broadcast delivery.
    • Answer: B,D
    • TCP differs from UDP in the following ways:

    • TCP provides best effort delivery.
    • TCP provides synchronized communication.
    • TCP segments are essentially datagrams.
    • TCP provides sequence numbering of packets.
    • TCP uses broadcast delivery.
  22. A workstation has just resolved a browser URL to the IP address of a server. What protocol will the workstation now use to determine the destination MAC address to be placed into frames directed toward the server?
    A. HTTP
    B. DNS
    C. DHCP
    D. RARP
    E. ARP
    • Answer: E
    • The RARP protocol is used to translate hardware interface addresses to protocol addresses. TheRARP message format is very similar to the ARP format. When the booting computer sends thebroadcast ARP request, it places its own hardware address in both the sending and receivingfields in the encapsulated ARP data packet. The RARP server will fill in the correct sending andreceiving IP addresses in its response to the message. This way the booting computer will knowits IP address when it gets the message from the RARP server

  23. Host A is sending a packet to Host B for the first time. What destination MAC address will Host Ause in the ARP request?

    A. 192.168.0.1
    B. 172.16.0.50
    C. 00-17-94-61-18-b0
    D. 00-19-d3-2d-c3-b2
    E. ff-ff-ff-ff-ff-ff
    F. 255.255.255.255
    Answer: E

    For the initial communication, Host A will send a broadcast ARP (all F's) to determine the correctaddress to use to reach the destination.

    ARP sends an Ethernet frame called an ARP request to every host on the shared link-layerlegmen. The Ethernet header includes the source host MAC address and a destination address ofall Fs representing a broadcast frame. The ARP request contains the sender's MAC and IPaddress and the target (destination) IP address. The target's MAC address is set to all 0s.

    ARP Request
  24. What are two common TCP applications? (Choose two.)

    A. TFTP
    B. SMTP
    C. SNMP
    D. FTP
    E. DNS
    • Answer: B,D
    • SMTP uses TCP port 25, while FTP uses TCP ports 20 and 21.

  25. SwitchA receives the frame with the addressing shown. According to the command output also shown in the exhibit, how will SwitchA handle this frame?

    A. It will drop the frame.
    B. It will forward the frame out port Fa0/6 only.
    C. It will flood the frame out all ports.
    D. It will flood the frame out all ports except Fa0/3.
    Answer: B

    Switches learn the MAC addresses of PCs or workstations that are connected to their switch portsby examining the source address of frames that are received on that port.Machines may have been removed from a port, turned off, or moved to another port on the same switch or a different switch.

    This could cause confusion in frame forwarding.

    The MAC address entry is automatically discarded or aged out after 300 seconds If there is not MAC address of destination host in MAC table, switch sends broadcast to all ports except the source to find out the destination host.

  26. SwitchA receives the frame with the addressing shown in the exhibit. According to the command output also shown in the exhibit, how will SwitchA handle this frame?

    A. It will drop the frame.
    B. It will forward the frame out port Fa0/6 only.
    C. It will forward the frame out port Fa0/3 only.
    D. It will flood the frame out all ports.
    E. It will flood the frame out all ports except Fa0/3.
    Answer: E

    When frame receives the frame, it checks the source address on MAC table if MAC address found in MAC table it tries to forward if not in MAC table adds the Address on MAC table.After checking the source address, it checks the destination address on MAC table, if MAC address found on MAC table it forwards to proper ports otherwise floods on all ports except the source port.

  27. The exhibit is showing the topology and the MAC address table. Host A sends a data frame to host D. What will the switch do when it receives the frame from host A?

    A. The switch will add the source address and port to the MAC address table and forward the frame to host D.
    B. The switch will discard the frame and send an error message back to host A.
    C. The switch will flood the frame out of all ports except for port Fa0/3.
    D. The switch will add the destination address of the frame to the MAC address table and forwardthe frame to host D.
    Answer: A

    When switch receives the data frame from the host not having the MAC address already on the MAC table, it will add the MAC address to source port on MAC address table and sends the data frame.
  28. Which two statements describe the operation of the CSMA/CD access method? (Choose two.)

    A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
    B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
    C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.
    D. After a collision, the station that detected the collision has first priority to resend the lost data.
    E. After a collision, all stations run a random back off algorithm. When the back off delay period has expired, all stations have equal priority to transmit data.
    F. After a collision, all stations involved run an identical back off algorithm and then synchronize
    Answer: B,E

    Ethernet networking uses Carrier Sense Multiple Access with Collision Detect (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium. CSMA/CD was created to overcome the problem of those collisions that occur when packets are transmitted simultaneously from different nodes. And trust me, good collision management is crucial, because when a node transmits in a CSMA/CD network, all the other nodes on the network receive and examine that transmission. Only bridges and routers can effectively prevent a transmission from propagating throughout the entire network!So, how does the CSMA/CD protocol work? Like this: when a host wants to transmit over the network, it first checks for the presence of a digital signal on the wire. If all is clear (no other host is transmitting), the host will then proceed with its transmission. But it doesn’t stop there. The transmitting host constantly monitors the wire to make sure no other hosts begin transmitting. If the host detects another signal on the wire, it sends out an extended jam signal that causes all nodes on the segment to stop sending data (think, busy signal). The nodes respond to that jam signal by waiting a while before attempting to transmit again. Back off algorithms determine when the colliding stations can retransmit. If collisions keep occurring after 15 tries, the nodes attempting to transmit will then time out.

  29. A network has been planned as shown. Which three statements accurately describe the areas and devices in the network plan? (Choose three.)

    A. Network Device A is a switch.
    B. Network Device B is a switch.
    C. Network Device A is a hub.
    D. Network Device B is a hub.
    E. Area 1 contains a Layer 2 device.
    F. Area 2 contains a Layer 2 device.
    Answer: A,D,E

    Switches use a separate collision domain for each port, so device A must be a switch. Hubs,however, place all ports in the same collision domain so device B is a hub. Switches reside in layer 2 while hubs are layer 1 devices.
  30. On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor?

    A. RTP
    B. TCP
    C. CDP
    D. UDP
    Answer: C

    The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per port power management details, and Quality of Service (QoS) configuration information with the Cisco Catalyst switch.

    Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices, which is useful info for troubleshooting the network.

    CDP messages are generated every 60 seconds as multicast messages on each of its active interfaces.

    • The information shared in a CDP packet about a Cisco device includes the following:
    • IOS software version
    • Hardware capabilities, such as routing, switching, and/or bridging
    • Hardware platform, such as 2600, 2950, or 1900
    • The layer-3 address(es) of the device
    • The interface the CDP update was generated on

  31. What must be configured to establish a successful connection from Host A to switch SW-A through router RT-A?

    A. VLAN 1 on RT-A
    B. IP routing on SW-A
    C. default gateway on SW-A
    D. crossover cable connecting SW-A and RT-A
    Answer: C

    In order for the switch to reach networks that are not local, such as networks attached to different interfaces of the router, it will need to set its default gateway to be the IP address of the attached router.
  32. At which layer of the OSI model does the protocol that provides the information that is displayed by the show CDP neighbors command operate?

    A. application
    B. transport
    C. network
    D. physical
    E. data link
    Answer: E

    CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco manufactureddevices (routers, bridges, access servers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices.With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer,transparent protocols.

    CDP allows devices to share basic configuration information without even configuring any protocol specific information and is enabled by default on all interfaces.

    CDP is a Data link Protocol occurring at Layer 2 of the OSI model.

    CDP is not routable and can only go over to directly connected devices.

    CDP is enabled, by default, on all Cisco devices. CDP updates are generated as multicasts every60 seconds with a hold-down period of 180 seconds for a missing neighbor. The no cdp run command globally disables CDP, while the no cdp enable command disables CDP on an interface. Use show cdp neighbors to list out your directly connected Cisco neighboring devices.Adding the detail parameter will display the layer-3 addressing configured on the neighbor.
  33. Which two characteristics apply to Layer 2 switches? (Choose two.)

    A. Increases the number of collision domains
    B. Decreases the number of collision domains
    C. Implements VLAN
    D. Decreases the number of broadcast domains
    E. Uses the IP address to make decisions for forwarding data packets
    Answer: A,C

    Layer 2 switches offer a number of benefits to hubs, such as the use of VLANs and each switchport is in its own separate collision domain, thus eliminating collisions on the segment.
  34. Which two characteristics describe the access layer of the hierarchical network design model?(Choose two.)

    A. layer 3 support
    B. port security
    C. redundant components
    D. VLANs
    E. PoE
    Answer: B,D

    • Access layer
    • The main purpose of the access layer is to provide direct connection to devices on the network and controlling which devices are allowed to communicate over it. The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network.The access layer can include routers, switches, bridges, hubs, and wireless access points (AP).

  35. Host B sends a frame to Host C. What will the switch do with the frame?

    A. Drop the frame
    B. Send the frame out all ports except port 0/2
    C. Return the frame to Host B
    D. Send an ARP request for Host C
    E. Send an ICMP Host Unreachable message to Host B
    F. Record the destination MAC address in the switching table and send the frame directly to HostC
    Answer: B


  36. The output is from a router in a large enterprise. From the output, determine the role of the router.

    A. A Core router.
    B. The HQ Internet gateway router.
    C. The WAN router at the central site.
    D. Remote stub router at a remote site.
    Answer: D
  37. To what type of port would a cable with a DB-60 connector attach?

    A. Serial port
    B. Console port
    C. Ethernet port
    D. Fibre optic port
    Answer: A

  38. A network administrator is connecting PC hosts A and B directly through their Ethernet interfaces as shown in the graphic. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? (Choose two.)

    A. A crossover cable should be used in place of the straight-through cable.
    B. A rollover cable should be used in place of the straight-through cable.
    C. The subnet masks should be set to 255.255.255.192
    D. A default gateway needs to be set on each host.
    E. The hosts must be reconfigured to use private IP addresses for direct connections of this type.
    F. The subnet masks should be set to 255.255.255.0
    Answer: A,F

  39. What kind of cable should be used to make each connection that is identified by the numbers shown?

    A.
    1 - Ethernet Crossover cable
    2 - Ethernet straight-through cable
    3 - Fiber Optic cable
    4 - Rollover cable

    B.
    1 - Ethernet straight-through cable
    2 - Ethernet straight-through cable
    3 - Serial cable
    4 - Rollover cable

    C.
    1 - Ethernet rollover cable
    2 - Ethernet crossover cable
    3 - Serial cable
    4 - Null-modem cable

    D.
    1 - Ethernet straight-through cable
    2 - Ethernet Crossover cable
    3 - Serial cable
    4 - Rollover cable

    E.
    1 - Ethernet straight-through cable
    2 - Ethernet Crossover cable
    3 - Serial cable
    4 - Ethernet Straight-through cable
    Answer: B
  40. Which of the following are types of flow control? (Choose three.)

    A. buffering
    B. cut-through
    C. windowing
    D. congestion avoidance
    E. load balancing
    Answer: A,C,D

    During Transfer of data, a high speed computer is generating data traffic a lot faster than the network device can handle in transferring to destination, so single gateway or destination device cannot handle much amount of traffic that is called "Congestion".

    • Buffering
    • The Technie is used to control the data transfer when we have congestion, when a network device receive a data it stores in memory section and then transfer to next destination this process called "Buffering".

    Windowing Whereas Windowing is used for flow control by the Transport layer. Say the sender device is sending segments and the receiver device can accommodate only a fixed number of segments before it can accept more, the two devices negotiate the window size during the connection setup.

    This is done so that the sending device doesn't overflow the receiving device's buffer.Also the receiving device can send a single acknowledgement for the segments it has received instead of sending an acknowledgement after every segment received.

    Also, this window size is dynamic meaning, the devices can negotiate and change the window size in the middle of a session. So if initially the window size is three and the receiving device thinks that it can accept more number of segments in its buffer it can negotiate with the sending device and it increase it to say 5 for example.

    Windowing is used only by TCP since UDP doesn't use or allow flow control.
  41. Which two options will help to solve the problem of a network that is suffering a broadcast storm?(Choose two.)

    A. a bridge
    B. a router
    C. a hub
    D. a Layer 3 switch
    E. an access point
    Answer: B,D

    Routers and layer 3 switches will not propagate broadcast traffic beyond the local segment, so the use of these devices is the best method for eliminating broadcast storms.
  42. A switch receives a frame on one of its ports. There is no entry in the MAC address table for the destination MAC address. What will the switch do with the frame?

    A. drop the frame
    B. forward it out of all ports except the one that received it
    C. forward it out of all ports
    D. store it until it learns the correct port
    Answer: B

    Understanding this concept is prime for understanding that when switch receives the data frame from the host not having the MAC address already in the MAC table, it will add the MAC address to the source port on the MAC address table and sends the data frame. If the switch already has the MAC address in it's table for the destination, it will forward the frame directly to the destination port. If it was not already in it's MAC table, then they frame would have been flooded out all ports except for the port that it came from.
  43. Which address type does a switch use to make selective forwarding decisions?

    A. Source IP address
    B. Destination IP address
    C. Source and destination IP address
    D. Source MAC address
    E. Destination MAC address
    Answer: E

    Switches analyze the destination MAC to make its forwarding decision since it is a layer 2 device. Routers use the destination IP address to make forwarding decisions.

  44. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch.

    What two operations will the switch perform when it receives this frame? (Choose two.)

    A. The switch will not forward a frame with this destination MAC address.
    B. The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table.
    C. The MAC address of ffff.ffff.ffff will be added to the MAC address table.
    D. The frame will be forwarded out all active switch ports except for port fa0/0.
    E. The frame will be forwarded out fa0/0 and fa0/1 only.
    F. The frame will be forwarded out all the ports on the switch.
    Answer: B,D

    If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from.
  45. What does a host on an Ethernet network do when it is creating a frame and it does not have the destination address?

    A. Drops the frame
    B. Sends out a Layer 3 broadcast message
    C. Sends a message to the router requesting the address
    D. Sends out an ARP request with the destination IP address
    Answer: D

    In this case, it will send out an ARP request for MAC address of the destination IP (assuming it doesn't already have it in its table) and then address it to the destination's MAC address.
  46. A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)?

    A. 4, 48
    B. 48, 4
    C. 48, 1
    D. 1, 48
    E. 4, 1
    Answer: B

    A switch uses a separate collision domain for each port, and each VLAN is a separate broadcast domain.

  47. All devices attached to the network are shown. How many collision domains are present in this network?

    A. 2
    B. 3
    C. 6
    D. 9
    E. 15
    Answer: E

    A switch uses a separate collision domain for each port so there are a total of 9 for each device shown. In addition to this, the switch to switch connections (3) are a separate collision domain.Finally, we add the switch to router connections (2) and the router to router connection (1) for a total of 15.

  48. The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch.

    What two operations will the switch perform when it receives this frame? (Choose two.)

    A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table.
    B. The MAC address of 0000.00dd.dddd will be added to the MAC address table.
    C. The frame will be forwarded out port fa0/3 only.
    D. The frame will be forwarded out fa0/1, fa0/2, and fa0/3.
    E. The frame will be forwarded out all the active ports.
    Answer: A,D

    If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. It will also add the MAC address of the source device to its MAC address table
  49. How many simultaneous Telnet sessions does a Cisco router support by default?

    A. 1
    B. 2
    C. 3
    D. 4
    E. 5
    F. 6
    Answer: E

What would you like to do?

Home > Flashcards > Print Preview