CCNA 1 v7

Modules 8 – 10: Communicating Between Networks Exam Answers

Modules 8 – 10: Communicating Between Networks Exam Answers Full
1. What is the purpose of the banner motd command?

  • It configures a message that will identify printed documents to LAN users.
  • It is a way that routers communicate the status of their links with one another.
  • It provides an easy way of communicating with any user attached to a router’s LANs.
  • It provides a way to make announcements to those who log in to a router.

2. A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this task?

  • user executive mode
  • global configuration mode
  • any line configuration mode
  • privileged EXEC mode

3. What is stored in the NVRAM of a Cisco router?

  • the Cisco IOS
  • the running configuration
  • the bootup instructions
  • the startup configuration

4. Which statement regarding the service password-encryption command is true?

  • It is configured in privileged EXEC mode.
  • It encrypts only line mode passwords.
  • As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted.
  • To see the passwords encrypted by the service password-encryption command in plain text, issue the no service password-encryption command.

5. When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?

  • Connectionless acknowledgements are used to request retransmission.
  • Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.
  • Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available.
  • The best-effort delivery process guarantees that all packets that are sent are received.

6. What was the reason for the creation and implementation of IPv6?

  • to make reading a 32-bit address easier
  • to relieve IPv4 address depletion
  • to provide more address space in the Internet Names Registry
  • to allow NAT support for private addressing

7. Which statement accurately describes a characteristic of IPv4?

  • All IPv4 addresses are assignable to hosts.​
  • IPv4 has a 32-bit address space.​
  • An IPv4 header has fewer fields than an IPv6 header has.​
  • IPv4 natively supports IPsec.​

8. Which field in an IPv4 packet header will typically stay the same during its transmission?

  • Flag
  • Time-to-Live
  • Packet Length
  • Destination Address

9. When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?

  • destination MAC address
  • source IP address
  • destination IP address
  • source MAC address

10. Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?

  • TTL
  • Hop Limit
  • Address Unreachable
  • No Route to Destination

11. Which command can be used on a Windows host to display the routing table?

  • netstat –s
  • show ip route
  • netstat –r
  • tracert

12. What information is added during encapsulation at OSI Layer 3?

  • source and destination MAC
  • source and destination application protocol
  • source and destination port number
  • source and destination IP address

13. How does the network layer use the MTU value?

  • The network layer depends on the higher level layers to determine the MTU.
  • The network layer depends on the data link layer to set the MTU, and adjusts the speed of transmission to accommodate it.
  • The MTU is passed to the network layer by the data link layer.
  • To increase speed of delivery, the network layer ignores the MTU.

14. Which characteristic describes an IPv6 enhancement over IPv4?​

  • IPv6 addresses are based on 128-bit flat addressing as opposed to IPv4 which is based on 32-bit hierarchical addressing.
  • The IPv6 header is simpler than the IPv4 header is, which improves packet handling.
  • Both IPv4 and IPv6 support authentication, but only IPv6 supports privacy capabilities.
  • The IPv6 address space is four times bigger than the IPv4 address space.​

15. When an IP packet is sent to a host on a remote network, what information is provided by ARP?

  • the IP address of the destination host
  • the IP address of the default gateway
  • the MAC address of the router interface closest to the sending host
  • the MAC address of the switch port that connects to the sending host

16. How does the ARP process use an IP address?

  • to determine the MAC address of the remote destination host
  • to determine the MAC address of a device on the same network
  • to determine the amount of time a packet takes when traveling from source to destination
  • to determine the network number based on the number of bits in the IP address

17. The ARP table in a switch maps which two types of address together?

  • Layer 3 address to a Layer 2 address
  • Layer 3 address to a Layer 4 address
  • Layer 4 address to a Layer 2 address
  • Layer 2 address to a Layer 4 address

18. What is one function of the ARP protocol?

  • obtaining an IPv4 address automatically
  • mapping a domain name to its IP address
  • resolving an IPv4 address to a MAC address
  • maintaining a table of domain names with their resolved IP addresses

19. Which router component holds the routing table, ARP cache, and running configuration file?

  • RAM
  • Flash
  • NVRAM
  • ROM

20. What type of information is contained in an ARP table?

  • switch ports associated with destination MAC addresses
  • domain name to IP address mappings
  • routes to reach destination networks
  • IP address to MAC address mappings

21. A PC is configured to obtain an IP address automatically from network 192.168.1.0/24. The network administrator issues the arp –a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?

  • This is a static map entry.
  • This is a dynamic map entry.
  • This entry refers to the PC itself.
  • This entry maps to the default gateway.

22. A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?

  • ipconfig /all
  • route print
  • netstat -r
  • arp -a

23. What is a function of ARP?

  • resolving MAC addresses to IPv4 addresses
  • resolving port addresses to MAC addresses
  • resolving MAC addresses to port addresses
  • resolving IPv4 addresses to MAC addresses

24. What is the purpose of ARP in an IPv4 network?

  • to forward data onward based on the destination IP address
  • to obtain a specific MAC address when an IP address is known
  • to forward data onward based on the destination MAC address.
  • to build the MAC address table in a switch from the information that is gathered

25. Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?

  • It drops the frame.
  • It sends the frame to all ports except the port on which it received the frame.
  • It sends the frame to all ports that are registered to forward broadcasts.
  • It sends the frame to all ports.

26. Which destination address is used in an ARP request frame?

  • 0.0.0.0
  • 255.255.255.255
  • FFFF.FFFF.FFFF
  • 127.0.0.1
  • 01-00-5E-00-AA-23

27. What addresses are mapped by ARP?

  • destination MAC address to a destination IPv4 address
  • destination IPv4 address to the source MAC address
  • destination IPv4 address to the destination host name
  • destination MAC address to the source IPv4 address

28. What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

  • It initiates an ARP request.
  • It broadcasts the frame out of all ports on the switch.
  • It notifies the sending host that the frame cannot be delivered.
  • It forwards the frame out of all ports except for the port at which the frame was received.

29. Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.)

  • router solicitation
  • router advertisement
  • neighbor solicitation
  • neighbor advertisement
  • echo request

30. A router boots and enters setup mode. What is the reason for this?

  • The IOS image is corrupt.
  • Cisco IOS is missing from flash memory.
  • The configuration file is missing from NVRAM.
  • The POST process has detected hardware failure.

31. Which command is used to encrypt all passwords in a router configuration file?

  • Router_A (config) # enable secret
  • Router_A (config) # service password-encryption
  • Router_A (config) # enable password
  • Router_A (config) # encrypt password

32. Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security?

  • secret password trustknow1
  • enable password trustknow1
  • service password-encryption
  • enable secret trustknow1

33. What will be the response from the router after the command, “router(config)# hostname portsmouth” is entered?

  • portsmouth#
  • portsmouth(config)#
  • invalid input detected
  • router(config-host)#
  • hostname = portsmouth
    portsmouth#
  • ? command not recognized
    router(config)#

34. An administrator is configuring a new router to permit out-of-band management access. Which set of commands will allow the required login using a password of cisco?

  • Router(config)# line vty 0 4
    Router(config-line)# password manage
    Router(config-line)# exit
    Router(config)# enable password cisco
  • Router(config)# line vty 0 4
    Router(config-line)# password cisco
    Router(config-line)# login
  • Router(config)# line console 0
    Router(config-line)# password cisco
    Router(config-line)# login
  • Router(config)# line console 0
    Router(config-line)# password cisco
    Router(config-line)# exit
    Router(config)# service password-encryption

35. Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status?

  • show ip interface brief
  • ping
  • show ip route
  • show interface fa0/1

36. Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting?

  • user EXEC mode
  • privileged EXEC mode
  • global configuration mode
  • interface configuration mode

37. What is the purpose of the startup configuration file on a Cisco router?

  • to facilitate the basic operation of the hardware components of a device
  • to contain the commands that are used to initially configure a router on startup
  • to contain the configuration commands that the router IOS is currently using
  • to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS

38. Which characteristic describes the default gateway of a host computer?

  • the logical address of the router interface on the same network as the host computer
  • the physical address of the switch interface connected to the host computer
  • the physical address of the router interface on the same network as the host computer
  • the logical address assigned to the switch interface connected to the router

Related Articles

Leave a Reply

avatar
Photo and Image Files
 
 
 
Audio and Video Files
 
 
 
Other File Types
 
 
 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
Notify of
Back to top button
Close