4.0CCNA 1: Network Fundamentals:Module6


Refer to the exhibit. Host A is communicating with host F. What happens to a frame sent from host A to host F as it travels over the Ethernet segments?
• The frame format is modified as it passes through each switch.
• The frame format remains the same across each Ethernet segment.
• The frame format is modified as the media speed changed at switch B and switch E.
• The frame format is modified as the media material changes between copper and fiber at switch C and switch D.

2. How many hexadecimal digits are in a MAC address?
• 2
• 8
• 12
• 32

3. What are three functions of a NIC in a PC? (Choose three.)
• A NIC connects the PC to the network media.
• A NIC detects collisions on the Ethernet segment.

• A NIC checks the formatting of data before it is transmitted.
A NIC passes the contents of selected frames to the upper OSI layers.

• A NIC acknowledges and retransmits data that was not received properly.
• A NIC discards frames when the destination IP address does not match the local host.

4. At what layer of the OSI model does a MAC address reside?
• 1
• 2
• 3
• 4
• 7

5. A router has an Ethernet, Token Ring, serial, and ISDN interface. Which interfaces will have a MAC address?
• serial and ISDN interfaces
• Ethernet and Token Ring interfaces
• Ethernet and ISDN interfaces
• Token Ring and serial interfaces

6. In an Ethernet LAN, how does the NIC know when it can transmit data?
• An Ethernet NIC transmits data as soon as the frame is received.
• An Ethernet NIC transmits data as soon as the NIC receives a token.
• An Ethernet NIC transmits data when it senses a collision.
• An Ethernet NIC transmits data after listening for the absence of a signal on the media.

7. Which characteristics describe carrier sense multiple access collision detect (CSMA/CD)? (Choose three.)
• reliable
• point-to-point
• nondeterministic
• connection-oriented
collision environment
• first-come, first-served approach

8. Which two devices can provide full-duplex Ethernet connections? (Choose two.)
• hub
• modem
• repeater
• Layer 2 switch

9. On a local area network, one workstation can send data on the line while it is receiving data. What type of data transfer does this describe?
• hybrid
• half duplex
• full duplex
• multilink


Refer to the exhibit. The small office network shown in the exhibit consists of four computers connected through a hub. Which configuration would cause collisions and errors on the network?
• autonegotiation
• FastEthernet
• peer-to-peer shared resources
• administratively configured full duplex


Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
• No collisions will occur on this link.
• Only one of the devices can transmit at a time.
• The switch will have priority for transmitting data.
• The devices will default back to half duplex if excessive collisions occur.


Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)
• Hosts 1 and 4 may be operating full duplex so no collision will exist.
• The hub will block the port connected to Host 4 to prevent a collision.
• After the end of the jam signal, Hosts 1, 2, 3, and 4 invoke a backoff algorithm.
• Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.
If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle, before transmitting.

13. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?
• The hosts return to a listen-before-transmit mode.
• The hosts creating the collision have priority to send data.
• The hosts creating the collision retransmit the last 16 frames.
• The hosts extend their delay period to allow for rapid transmission.

14. Which statement describes how CSMA/CD on an Ethernet segment manages the retransmission of frames after a collision occurs?
• The first device to detect the collision has the priority for retransmission.
• The device with the lowest MAC address determines the retransmission priority.
• The devices on the network segment hold an election for priority to retransmit data
• The devices transmitting when the collision occurs DO NOT have priority for retransmission.


Refer to the exhibit. A technician wants to increase the available bandwidth for the workstation by allowing the switch and the NIC on the workstation to transmit and receive simultaneously. What will permit this?
• full-duplex
• FastEthernet
• crossover cable

16. Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frame?
• A random delay is used to ensure a collision-free link.
• A random delay value for each device is assigned by the manufacturer.
• A standard delay value could not be agreed upon among networking device vendors.
• A random delay helps prevent the stations from experiencing another collision during the transmission.

17. In which two layers of the OSI model does Ethernet function? (Choose two.)
• application
• session
• transport
• network
• data link
• physical

18. Which of the following are specified by IEEE standards as sublayers of the OSI data link layer? (Choose two.)
• Logical Link Control
• Logical Layer Control
Media Access Control

• Logical Link Communication
• Media Access Communication
• Physical Access Communication

19. Where does the MAC address originate?
• DHCP server database
• configured by the administrator
• burned into ROM on the NIC card
• network configuration on the computer
• included in the creation of the processor chip

Which statements are true regarding IP addressing? (Choose two.)

NAT translates public addresses to private addresses destined for the Internet.

Only one company is allowed to use a specific private network address space.

Private addresses are blocked from public Internet by router.

Network is part of the private address space.

IP address can be used for a host to direct traffic to itself.


Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?

The host subnet mask is incorrect.

The default gateway is a network address.

The default gateway is a broadcast address.

The default gateway is on a different subnet from the host.

Given the IP address and subnet mask of, which of the following would describe this address?

This is a useable host address.

This is a broadcast address.

This is a network address.

This is not a valid address.

Which of the following are features of IPv6? (Choose three.)

larger address space

faster routing protocols

data types and classes of service

authentication and encryption

improved host naming conventions

same addressing scheme as IPv4

A router interface has been assigned an IP address of with a mask of To which subnet does the IP address belong?

Which IPv4 subnetted addresses represent valid host addresses? (Choose three.) /26 /26 /26 /27 /27 /27

What subnet mask would a network administrator assign to a network address of if it were possible to have up to 254 hosts?

Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)

LAN workstations


network printers


remote workstations


Which three IP addresses are private? (Choose three.)

Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask?

binary adding

hexadecimal anding

binary division

binary multiplication

binary ANDing

Which of the following is a characteristic of DHCP?

provides an IP address to a device from an individual profile for the host

provides an IP address dynamically to a device from a defined range of IP addresses

provides IP addresses to devices using all unicast transmission to save bandwidth

provides an IP address only to devices with fixed profiles


Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic.








Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server’s properties to allow connectivity to the network?

IP address: subnet mask: default gateway:

IP address: subnet mask: default gateway:

IP address: subnet mask: default gateway:

IP address: subnet mask: default gateway:

IP address: subnet mask: default gateway:

Related Posts :


Design by The Blogger Templates Distributed by Mumbai Mania

Design by The Blogger Templates