4.0CCNA 1: Network Fundamentals:Module9

1

When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?

The hosts return to a listen-before-transmit mode.

The hosts creating the collision have priority to send data.

The hosts creating the collision retransmit the last 16 frames.

The hosts extend their delay period to allow for rapid transmission.

2
What are the two dynamic methods used to maintain ARP tables? (Choose two.)

monitor traffic on the local segment

monitor traffic on the local and remote segments

send a Layer 2 broadcast containing an ARP request

send a Layer 3 broadcast containing an ARP request

3
Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.

85

90

BA

A1

B3

1

4


Refer to the exhibit. What command was executed on a host computer to produce the results shown?

route PRINT

arp -a

arp -d

netstat

telnet

5
What are the two basic functions of the ARP protocol? (Choose two.)

resolve known IPv6 addresses to MAC addresses

resolve known MAC to IP addresses

maintain ARP cache in RAM

resolve known IPv4 addresses to MAC addresses

6


Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?

No collisions will occur on this link.

Only one of the devices can transmit at a time.

The switch will have priority for transmitting data.

The devices will default back to half duplex if excessive collisions occur.

7
Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frame?

A random delay is used to ensure a collision-free link.

A random delay value for each device is assigned by the manufacturer.

A standard delay value could not be agreed upon among networking device vendors.

A random delay helps prevent the stations from experiencing another collision during the transmission.

8
Which statements correctly describe MAC addresses? (Choose three.)

dynamically assigned

copied into RAM during system startup

layer 3 address

contains a 3 byte OUI

6 bytes long

32 bits long

9
Ethernet operates at which layers of the OSI model? (Choose two.)

Network layer

Transport layer

Physical layer

Application layer

Session layer

Data-link layer

10


Refer to the exhibit. Host_A is attempting to contact Server_B. Which statements correctly describe the addressing Host_A will generate in the process? (Choose two.)

A packet with the destination IP of Router_B.

A frame with the destination MAC address of Switch_A.

A packet with the destination IP of Router_A.

A frame with the destination MAC address of Router_A.

A packet with the destination IP of Server_B.

A frame with the destination MAC address of Server_B.

11


In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do?

Host B can transmit immediately since it is connected on its own cable segment.

Host B must wait to receive a CSMA transmission from the hub, to signal its turn.

Host B must send a request signal to Host A by transmitting an interframe gap.

Host B must wait until it is certain that Host A has completed sending its frame.

12
After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data?

the device involved in the collision with the lowest MAC address

the device involved in the collision with the lowest IP address

any device in the collision domain whose backoff timer expires first

those that began transmitting at the same time

13
Which of the following is a drawback of the CSMA/CD access method?

Collisions can decrease network performance.

It is more complex than non-deterministic protocols.

Deterministic media access protocols slow network performance.

CSMA/CD LAN technologies are only available at slower speeds than other LAN technologies.

14
What does the IEEE 802.2 standard represent in Ethernet technologies?

MAC sublayer

Physical layer

Logical Link Control sublayer

Network layer

15
Which of the following describe interframe spacing? (Choose two.)

the minimum interval, measured in bit-times, that any station must wait before sending another frame

the maximum interval, measured in bit-times, that any station must wait before sending another frame

the 96-bit payload padding inserted into a frame to achieve a legal frame size

the 96-bit frame padding transmitted between frames to achieve proper synchronization

the time allowed for slow stations to process a frame and prepare for the next frame

the maximum interval within which a station must send another frame to avoid being considered unreal
16. What are two facts about how ARP resolves an IP address to a MAC address? (Choose two.)
• The originating host dynamically issues an arp -a command to obtain the destination MAC address.
• The originating host broadcasts an ARP request packet and each host in a local network receives this packet.
• The originating host dynamically issues an icmp echo request command to obtain the destination MAC address.
• The host with the specified destination IP address sends an ARP reply packet containing its MAC address back to the originating host.
• The host with the specified destination IP address sends an icmp echo reply packet to the originating host with its MAC address.

17. Which TCP/IP model layer supports both LAN and WAN technologies?
• network access layer
• internet layer
• transport layer
• application layer

18. What is the primary responsibility of the transport layer?
• allows access to the network media
• provides data representation and encoding
• selects paths through the network for data to travel
• defines end-to-end connectivity between host applications

19. What is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask?
• 192.168.0.0
• 192.168.0.255
• 192.168.32.0
• 192.168.32.254
• 192.168.32.255

20. Which two statements correctly describe the IP address 127.0.0.1? (Choose two.)
• It belongs to the Class A range of addresses.
• It belongs to the Class B range of addresses.
• It belongs to the Class C range of addresses.
• It is reserved for loopback testing.
• It is reserved for multicast group testing.
• It is reserved for unicast testing.

21.

Refer to the exhibit. The small office LAN shown in the exhibit may eventually be connected to the Internet. According to Cisco best practice, which IP network addresses should be used?
• 12.0.0.0
• 172.0.0.0
• 172.168.0.0
• 192.32.17.0
• 192.168.67.0
• 225.1.5.0

22. Why is IP considered a best-effort protocol?
• IP detects lost packets.
• IP validates the content of the packets.
• IP does not provide acknowledgment of the data delivery.
• IP reorders the packet as they arrive at the destination host.

23. Which three addresses are considered to be private addresses? (Choose three.)
• 10.45.09.23
• 15.87.234.87
• 172.32.45.90
• 172.17.78.98
• 192.169.89.56
• 192.168.45.23

24.


Refer to the exhibit. Based on the information shown, which two statements are true? (Choose two.)
• An ARP request must be used to obtain an address that is placed in the ARP table.
• Frames from other hosts in the network to this host will use a destination address of 00-06-25-25-6e-5d.
• The only remote locations that can be reached from this host are 192.168.1.97 and 192.168.1.254.
• If a packet is sent to a network device other than 192.168.1.97 and 192.168.1.254, an ARP request must be used.
• If the computer with the IP address of 192.168.1.94 sends a packet to the device with the IP address 192.168.1.97, no ARP request is required.

25.

Refer to the exhibit. Which devices are recommended to have the IP addresses manually configured?
• PC1 and PC2
• all servers
• only PC2 Laptop
• all hosts and all servers

26. Why were private IP addresses developed?
• to permit dynamic assignment of IP addresses
• to permit the duplication of public IP addresses
• to minimize the utilization of reserved IP addresses
• to permit public IP addresses to be used in private networks
• to address the issue of not enough available public IP addresses

27. Which subnet mask would be assigned to the network address of 192.168.32.0 to provide 254 useable host addresses per subnetwork?
• 255.255.0.0
• 255.255.255.0
• 255.255.254.0
• 255.255.248.0

28. When a host has an empty ARP cache, what is the next step the host will take to find the destination MAC address of a remote host?
• sends an ARP request as a unicast to the server
• sends an ARP request as a unicast to the destination
• sends an ARP request as a broadcast to all hosts in the local network
• sends an ARP request as a unicast to the default gateway

29.

Refer to the exhibit. What is the purpose of the Obtain an IP address automatically option shown in the exhibit?
• to configure the computer to use ARP
• to configure the computer to use DHCP
• to configure the computer to use a routing protocol
• to configure the computer with a statically assigned IP address

30. How many usable hosts are available given a Class C IP address with the default subnet mask?
• 254
• 255
• 256
• 510
• 511
• 512

31. Which statement accurately describes public IP addresses?
• Public addresses cannot be used within a private network.
• Public IP addresses must be unique across the entire Internet.
• Public addresses can be duplicated only within a local network.
• Public IP addresses are only required to be unique within the local network.
• Network administrators are free to select any public addresses to use for network devices that access the Internet.

32. Which IPv4 class of addresses provides the most networks?
• Class A
• Class B
• Class C
• Class D
• Class E

33. Which IPv4 class provides the highest number of host addresses per network?
• Class A
• Class B
• Class C
• Class D
• Class E

34. What is the purpose of a DHCP server on a network?
• to resolve MAC addresses to IP addresses
• to resolve IP addresses to MAC addresses
• to resolve host names to IP addresses
• to assign IP addresses dynamically to hosts
• to assign a MAC address to a host

35.

Refer to the exhibit. Which two statements are correct in reference to the output shown? (Choose two.)
• The LAN segment is subnetted to allow 254 subnets.
• The DNS server for this host is on the same subnet as the host.
• The host automatically obtained the IP addresses 192.168.1.100.
• The host received the IP address from the router on the local LAN segment.

• The host is assigned an address of 00-50-8D-F1-EA-8D by the administrator.

Related Posts :



0 comments:

Design by The Blogger Templates Distributed by Mumbai Mania

Design by The Blogger Templates