Category Archives: CCNA 1 v5

CCNA 1 v5 ITN Chapter 6 Skill Assessment – Packet Tracer 2014

CCNA 1 v5 ITN Chapter 6 Skill Assessment – Packet Tracer 2014

Download File .PKZ

ccna-1-chapter-6-skill-assessment

Science Router Configuration

Science>enable
Science#configure terminal
Science(config)#enable secret cisco

Science(config)#line console 0
Science(config-line)#password cisco
Science(config-line)#login
Science(config-line)#exit

Science(config)#line vty 0 4
Science(config-line)#password cisco
Science(config-line)#login
Science(config-line)#exit

Science(config)#line aux 0
Science(config-line)#password cisco
Science(config-line)#login
Science(config-line)#exit

Science(config)#service password-encryption

Science(config)#banner motd “Authorized Personnel Only”

Science(config)#interface g0/0
Science(config-if)#ip address 172.16.5.1 255.255.255.0
Science(config-if)#no shutdown
Science(config-if)#description Bio LAN
Science(config-if)#exit

Science(config)#interface g0/1
Science(config-if)#ip address 192.168.5.1 255.255.255.0
Science(config-if)#no shutdown
Science(config-if)#description Phys LAN
Science(config-if)#end

Science#write
Building configuration…
[OK]

Bio Switch Configuration

Switch>enable
Switch#configure terminal

Switch(config)#hostname Bio

Bio(config)#enable secret class

Bio(config)#line console 0
Bio(config-line)#password cisco
Bio(config-line)#login
Bio(config-line)#exit

Bio(config)#line vty 0 4
Bio(config-line)#password cisco
Bio(config-line)#login
Bio(config-line)#exit

Bio(config)#service password-encryption

Bio(config)#banner motd “Authorized Personnel Only”

Bio(config)#interface vlan 1
Bio(config-if)#ip address 172.16.5.2 255.255.255.0
Bio(config-if)#no shutdown
Bio(config-if)#description Bio – Science LAN
Bio(config-if)#exit

Bio(config)#ip default-gateway 172.16.5.1

Bio(config)#end
Bio#write
Building configuration…
[OK]

Phys Switch Configuration

Switch>enable
Switch#configure terminal

Switch(config)#hostname Phys

Phys(config)#enable secret class

Phys(config)#line console 0
Phys(config-line)#password cisco
Phys(config-line)#login
Phys(config-line)#exit

Phys(config)#line vty 0 4
Phys(config-line)#password cisco
Phys(config-line)#login
Phys(config-line)#exit

Phys(config)#service password-encryption

Phys(config)#banner motd “Authorized Personnel Only”

Phys(config)#interface vlan 1
Phys(config-if)#ip address 192.168.5.252 255.255.255.0
Phys(config-if)#no shutdown
Phys(config-if)#description Phys – Science LAN
Phys(config-if)#exit

Phys(config)#ip default-gateway 192.168.5.1
Phys(config)#end

Phys#write
Building configuration…
[OK]

Bio 1

172.16.5.10
255.255.255.0
172.16.5.1

Bio 2

172.16.5.11
255.255.255.0
172.16.5.1

Phys 1

192.168.5.10
255.255.255.0
192.168.5.1

Phys 2

192.168.5.11
255.255.255.0
192.168.5.1

CCNA 1 v5.02 ITN Chapter 6 Exam Answers

1. When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?

connectionless acknowledgements

upper-layer connection-oriented protocols*

Network layer IP protocols

Transport layer UDP protocols

2. Which IPv4 header field is responsible for defining the priority of the packet??

flow label

flags

differentiated services*

traffic class

3. Why is NAT not needed in IPv6??

Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.?

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.?*

The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.?

The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet.

4. What is a service provided by the Flow Label field of the IPv6 header?

It limits the lifetime of a packet.

It identifies the total length of the IPv6 packet.

It classifies packets for traffic congestion control.

It informs network devices to maintain the same path for real-time application packets.*

5. How do hosts ensure that their packets are directed to the correct network destination?

They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.?*

They always direct their packets to the default gateway, which will be responsible for the packet delivery.

They search in their own local routing table for a route to the network destination address and pass this information to the default gateway.

They send a query packet to the default gateway asking for the best route.

6. Which two commands can be used on a Windows host to display the routing table? (Choose two.)

netstat -s

route print

show ip route

netstat -r*

tracert

7. During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

discard the traffic after consulting the route table

look up the next-hop address for the packet

switch the packet to the directly connected interface*

analyze the destination IP address

8. A technician is configuring a router that is actively running on the network. Suddenly, power to the router is lost. If the technician has not saved the configuration, which two types of information will be lost? (Choose two.)

Cisco IOS image file

routing table*

bootstrap file

ARP cache*

startup configuration

9. Which two interfaces will allow access via the VTY lines to configure the router? (Choose two.)

aux interfaces

LAN interfaces*

WAN interfaces*

console interfaces

USB interfaces

10. Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)

running configuration

IOS image file*

startup configuration*

POST diagnostics

11. When would the Cisco IOS image held in ROM be used to boot the router?

during a file transfer operation

during a normal boot process

when the full IOS cannot be found*

when the running configuration directs the router to do this

12. After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router reboots. What command should be issued?

copy running-config flash

copy startup-config flash

copy running-config startup-config*

reload

copy startup-config running-config

13. Which three commands are used to set up a password for a person who attaches a cable to a new router so that an initial configuration can be performed? (Choose three.)

interface fastethernet 0/0

line vty 0 4

line console 0*

enable secret cisco

login*

password cisco*

14. Which statement about router interfaces is true?

Router LAN interfaces are not activated by default, but router WAN interfaces are.

Once the no shutdown command is given, a router interface is active and operational.*

Commands that apply an IP address and subnet mask to an interface are entered in global configuration mode.

A configured and activated router interface must be connected to another device in order to operate.*

15. Which command displays a summary chart of all router interfaces, their IP addresses, and their current operational status?

show ip route

show version

show interfaces

show ip interface brief*

16. A technician is manually configuring a computer with the necessary IP parameters to communicate over the corporate network. The computer already has an IP address, a subnet mask, and a DNS server. What else has to be configured for Internet access?

the WINS server address

the default gateway address*

the MAC address

the domain name of the organization

17. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

he packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host.

The packet will be sent directly to the destination host.*

The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host.

The packet will be sent only to the default gateway.

18. Refer to the exhibit.

 Fill in the blank.

A packet leaving PC-1 has to traverse  _3_ hops to reach PC-4.?

19. Fill in the blank.

In a router, __ROM is the nonvolatile memory where the diagnostic software, the bootup instructions, and a limited IOS are stored.

20. Match the configuration mode with the command that is available in that mode. (Not all options are used.)

Sort elements
enable -> R1>
copy running-config startup-config -> R1#
login -> R1(config-line)#
interface fastethernet 0/0 -> R1(config)#

21. Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)

Sort elements
FastEthernet0/0 -> packets with destination of 172.17.6.15
FastEthernet0/1 -> packets with destination of 172.17.14.8
FastEthernet1/0 -> packets with destination of 172.17.12.10
FastEthernet1/1 -> packets with destination of 172.17.10.5
Serial0/0/0 -> packets with destination of 172.17.8.20

22. Match field names to the IP header where they would be found. (Not all options are used.)

Sort elements
IP v4 Header (A) -> Flags (A)
IP v4 Header (B) -> Total Length (B)
IP v6 Header (C) -> Traffic Class (C)
IP v6 Header (D) -> Flow Label (D)

23. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question or complete the task.

Does the router have enough RAM and flash memory to support the new IOS?

The router has enough RAM and flash memory for the IOS upgrade.*

The router has enough RAM, but needs more flash memory for the IOS upgrade.

The router has enough flash memory, but needs more RAM for the IOS upgrade.

The router needs more RAM and more flash memory for the IOS upgrade.

CCNA 1 v5.02 ITN Chapter 5 Exam Answers

1. Which statement is true about MAC addresses?

MAC addresses are implemented by software.

A NIC only needs a MAC address if connected to a WAN.

The first three bytes are used by the vendor assigned OUI.*

The ISO is responsible for MAC addresses regulations.

2. What is a characteristic of a contention-based access method?

It processes more overhead than the controlled access methods do.

It has mechanisms to track the turns to access the media.

It is a nondeterministic method.*

It scales very well under heavy media use.

3. Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)

Logical link control is implemented in software.*

Logical link control is specified in the IEEE 802.3 standard.

The LLC sublayer interacts directly with the NIC driver software.

The data link layer uses LLC to communicate with the upper layers of the protocol suite.*

The LLC sublayer is responsible for the placement and retrieval of frames on and off the media.

4. What is the purpose of the preamble in an Ethernet frame?

is used as a padding for data

is used for timing synchronization*

is used to identify the source address

is used to identify the destination address

5. What is the Layer 2 multicast MAC address that corresponds to the Layer 3 IPv4 multicast address 224.139.34.56?

00-00-00-0B-22-38

01-00-5E-0B-22-38*

01-5E-00-0B-22-38

FE-80-00-0B-22-38

FF-FF-FF-0B-22-38

6. Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.)

A packet that has crossed four routers has changed the destination IP address four times.

Destination MAC addresses will never change in a frame that goes across seven routers.

Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another.*

Destination IP addresses in a packet header remain constant along the entire path to a target host.*

Every time a frame is encapsulated with a new destination MAC address, a new destination IP address is needed.

7. What are two features of ARP? (Choose two.)

If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.*

An ARP request is sent to all devices on the Ethernet LAN and contains the IP address of the destination host and its multicast MAC address.

When a host is encapsulating a packet into a frame, it refers to the MAC address table to determine the mapping of IP addresses to MAC addresses.

If no device responds to the ARP request, then the originating node will broadcast the data packet to all devices on the network segment.

If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.*

8. Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next??

PC2 will send an ARP reply with its MAC address.*

RT1 will send an ARP reply with its Fa0/0 MAC address.?

RT1 will send an ARP reply with the PC2 MAC address.?

SW1 will send an ARP reply with the PC2 MAC address.?

SW1 will send an ARP reply with its Fa0/1 MAC address.?

9. A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address?

It will send an ARP request for the MAC address of the destination device.

It will send an ARP request for the MAC address of the default gateway.*

It will send the frame and use its own MAC address as the destination.

It will send the frame with a broadcast MAC address.

It will send a request to the DNS server for the destination MAC address.

10. What are two potential network problems that can result from ARP operation? (Choose two.)

Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing.

On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.*

Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.*

Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network.

Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port.

11. A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection? (Choose three.)

The link between the switches will work at the fastest speed that is supported by both switches.*

The link between switches will work as full-duplex.*

If both switches support different speeds, they will each work at their own fastest speed.

The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.*

The connection will not be possible unless the administrator changes the cable to a crossover cable.

The duplex capability has to be manually configured because it cannot be negotiated.

12. A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

port-based buffering

level 1 cache buffering

shared memory buffering*

fixed configuration buffering

13. When would a switch record multiple entries for a single switch port in its MAC address table?

when a router is connected to the switch port

when multiple ARP broadcasts have been forwarded

when another switch is connected to the switch port*

when the switch is configured for Layer 3 switching

14. Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?

 

The switch will discard the frame.

The switch will forward the frame only to port 2.

The switch will forward the frame to all ports except port 4.*

The switch will forward the frame to all ports.

The switch will forward the frame only to ports 1 and 3.

15. Which two statements describe a fixed configuration Ethernet switch? (Choose two.)

The switch cannot be configured with multiple VLANs.

An SVI cannot be configured on the switch.

A fixed configuration switch may be stackable.*

The number of ports on the switch cannot be increased.*

The port density of the switch is determined by the Cisco IOS.

16. How does adding an Ethernet line card affect the form factor of a switch?

by increasing the back plane switching speed

by expanding the port density*

by making the switch stackable

by expanding the NVRAM capacity

17. A network administrator issues the following commands on a Layer 3 switch:DLS1(config)# interface f0/3

DLS1(config-if)# no switchport

DLS1(config-if)# ip address 172.16.0.1 255.255.255.0

DLS1(config-if)# no shutdown

DLS1(config-if)# endWhat is the administrator configuring?

a routed port*

a switched virtual interface

a Cisco Express Forwarding instance

a trunk interface

18. Which address or combination of addresses does a Layer 3 switch use to make forwarding decisions?

IP address only

port address only

MAC address only

MAC and port addresses

MAC and IP addresses*

19. What statement illustrates a drawback of the CSMA/CD access method?

Deterministic media access protocols slow network performance.

It is more complex than non-deterministic protocols.

Collisions can decrease network performance.*

CSMA/CD LAN technologies are only available at slower speeds than other LAN technologies.

20. Fill in the blank.

The binary number 0000 1010 can be expressed as __0A__  in hexadecimal.

21. Match the characteristic to the forwarding method. (Not all options are used.)

Sort elements
cut-through (A) -> low latency (A)
cut-through (B) -> may forward runt frames (B)
cut-through (C) -> begins forwarding when the destination address is received (C)
store-and-forward (D) -> always stores the entire frame (D)
store-and-forward (E) -> checks the CRC before forwarding (E)
store-and-forward (F) -> checks the frame length before forwarding (F)

22. Match the seven fields of an Ethernet frame to their respective contents. (Not all options are used.)

 

Sort elements
Start Frame Delimiter -> Field 2
Source MAC Address -> Field 4
Encapsulated Data -> Field 6
Preamble -> Beginning of frame – Field 1
Destination MAC Address -> Field 3
Length/Type -> Field 5
Frame Check Sequence -> End of frame – Field 7

23. Open the PT Activity. Perform the tasks in the activity instruction and then answer the question.

What destination address will PC1 include in the destination address field of the Ethernet frame that it sends to PC2?

192.168.0.17

192.168.0.34

0030.a3e5.0401*

00e0.b0be.8014

0007.ec35.a5c6

CCNA 1 v5.02 ITN Chapter 4 Exam Answers

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

application

transport

data link*

physical

2. Which statement describes signaling at the physical layer?

Sending the signals asynchronously means that they are transmitted without a clock signal.*

In signaling, a 1 always represents voltage and a 0 always represents the absence of voltage.

Wireless encoding includes sending a series of clicks to delimit the frames.

Signaling is a method of converting a stream of data into a predefined code

3. What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)

to reduce the number of collisions on the media

to distinguish data bits from control bits*

to provide better media error correction

to identify where the frame starts and ends*

to increase the media throughput

4. The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 15 Mb/s for the same time period. What is the goodput for this network?

15 Mb/s

95 Mb/s

55 Mb/s

65 Mb/s*

80 Mb/s

5. A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

EMI*

crosstalk

RFI?*

signal attenuation

extended length of cabling

6. How is the magnetic field cancellation effect enhanced in UTP cables?

by increasing the thickness of the PVC sheath that encases all the wires

by increasing and varying the number of twists in each wire pair*

by increasing the thickness of the copper wires

by decreasing the number of wires that are used to carry data

7. Refer to the exhibit. What is wrong with the displayed termination?

 

The jack used is an RJ-11 connector instead of an RJ-45 connector.

The cable is not shielded.

The untwisted length of each wire is too long.*

The wires are too thick for the connector that is used.

8. Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices??

1 – rollover, 2 – crossover, 3 – straight-through

1 – rollover, 2 – straight-through, 3 – crossover*

1 – crossover, 2 – straight-through, 3 – rollover

1 – crossover, 2 – rollover, 3 – straight-through

9. Which statement is correct about multimode fiber?

Multimode fiber cables carry signals from multiple connected sending devices.

Multimode fiber commonly uses a laser as a light source.

SC-SC patch cords are used with multimode fiber cables.*

Multimode fiber has a thinner core than single-mode fiber..

10. What is one advantage of using fiber optic cabling rather than copper cabling?

It is usually cheaper than copper cabling.

It is able to be installed around sharp bends.

It is easier to terminate and install than copper cabling.

It is able to carry signals much farther than copper cabling.*

11. Why are two strands of fiber used for a single fiber optic connection?

The two strands allow the data to travel for longer distances without degrading.

They prevent crosstalk from causing interference on the connection.

They increase the speed at which the data can travel.

They allow for full-duplex connectivity.*

12. A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

mobility options

security*

interference*

coverage area*

extensive cabling

packet collision

13. A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

802.11n

802.11ac*

802.11g

802.11b

14. What is one main characteristic of the data link layer?

It generates the electrical or optical signals that represent the 1 and 0 on the media.

It converts a stream of data bits into a predefined code.

It shields the upper layer protocol from being aware of the physical medium to be used in the communication.*

It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.

15. As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame??

The transmitting node inserts start and stop bits into the frame.*

The transmitting node sends a beacon to notify that a data frame is attached.

The receiving node identifies the beginning of a frame by seeing a physical address.

The transmitting node sends an out-of-band signal to the receiver about the beginning of the frame.

16. What is true concerning physical and logical topologies?

The logical topology is always the same as the physical topology.

Physical topologies are concerned with how a network transfers frames.

Physical topologies display the IP addressing scheme of each network.

Logical topologies determine the media access control method used.*

17. What are two characteristics of 802.11 wireless networks? (Choose two.)

They use CSMA/CA technology.*

They use CSMA/CD technology.

They are collision-free networks.

Stations can transmit at any time.

Collisions can exist in the networks.*

 

18. What is the purpose of the FCS field in a frame?

to obtain the MAC address of the sending node

to verify the logical address of the sending node

to compute the CRC header for the data field

to determine if errors occurred in the transmission and reception*

19. Fill in the blank with a number.

10,000,000,000 b/s can also be written as  _10_   Gb/s.

20. Fill in the blank.

The term  __bandwidth__  indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).?

21. Fill in the blank.

What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame? __LLC__

CCNA 1 v5.02 ITN Chapter 3 Exam Answers

1. A computer in a given network is communicating with a specific group of computers. What type of communication is this?

broadcast

multicast*

unicast

ARP

HTTP

2. What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

encapsulation

flow control*

access method

response timeout

3. Which protocol is responsible for controlling the size and rate of the HTTP messages exchanged between server and client?

HTTP

ARP

TCP*

DHCP

4. A user is viewing an HTML document located on a web server. What protocol segments the messages and manages the segments in the individual conversation between the web server and the web client?

DHCP

TCP*

HTTP

ARP

5. A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

HTTP, IP, TCP, Ethernet

HTTP, TCP, IP, Ethernet*

Ethernet, TCP, IP, HTTP

Ethernet, IP, TCP, HTTP

6. What are proprietary protocols?

protocols developed by private organizations to operate on any vendor hardware

protocols that can be freely used by any organization or vendor

protocols developed by organizations who have control over their definition and operation*

a collection of protocols known as the TCP/IP protocol suite

7. Which IEEE standard enables a wireless NIC to connect to a wireless AP that is made by a different manufacturer?

802.1

802.11*

802.3

802.2

8. What is an advantage of network devices using open standard protocols?

Network communications is confined to data transfers between devices from the same vendor.

A client host and a server running different operating systems can successfully exchange data.*

Internet access can be controlled by a single ISP in each market.

Competition and innovation are limited to specific types of products.

9. What is a function of Layer 4 of the OSI model?

to specify the packet type to be used by the communications

to apply framing information to the packet, based on the attached media

to represent data to the user, including encoding and dialog control

to describe the ordered and reliable delivery of data between source and destination*

10. Which statement is true about the TCP/IP and OSI models?​

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.​*

The TCP/IP network access layer has similar functions to the OSI network layer.​

The OSI Layer 7 and the TCP/IP application layer provide identical functions.

The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.​

11. What is a benefit of using a layered model for network communications?

fostering competition among device and software vendors by enforcing the compatibility of their products*

enhancing network transmission performance by defining targets for each layer

avoiding possible incompatibility issues by using a common set of developing tools

simplifying protocol development by limiting every layer to one function

12. What is the general term that is used to describe a piece of data at any layer of a networking model?

frame

packet

protocol data unit*

segment

13. Which PDU format is used when bits are received from the network medium by the NIC of a host?

file

frame*

packet

segment

14. At which layer of the OSI model would a logical address be encapsulated?

physical layer

data link layer

network layer*

transport layer

15. Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

Data is sent from the internet layer to the network access layer.

Packets are sent from the network access layer to the transport layer.

Segments are sent from the transport layer to the internet layer.*

Frames are sent from the network access layer to the internet layer.

16. What statement describes the function of the Address Resolution Protocol?

ARP is used to discover the IP address of any host on a different network.

ARP is used to discover the IP address of any host on the local network.

ARP is used to discover the MAC address of any host on a different network.

ARP is used to discover the MAC address of any host on the local network.*

17. Which address provides a unique host address for data communications at the internet layer?

data-link address

logical address*

Layer 2 address

physical address

18. Which address does a NIC use when deciding whether to accept a frame?

source IP address

source MAC address

destination IP address

destination MAC address*

source Ethernet address

19. Which protocol is used by a computer to find the MAC address of the default gateway on an Ethernet network?

ARP*

TCP

UDP

DHCP

20. If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host is unable to communicate on the local network.

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.*

The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.

There is no impact on communications.

21. Match the description to the organization. (Not all options are used.)

22. Open the PT Activity.

Perform the tasks in the activity instructions and then answer the question.

Based on the configured network, what IP address would PC1 and PC2 use as their default gateway?

192.168.1.2

10.1.1.1

172.16.1.1

192.168.1.1*

192.168.1.10

CCNA 1 v5.02 ITN Chapter 2 Exam Answers

1. Which two features are characteristics of flash memory? (Choose two.)

Flash provides nonvolatile storage.*

Flash receives a copy of the IOS from RAM when a device is powered on.

The contents of flash may be lost during a power cycle.

Flash is a component in Cisco switches but not in Cisco routers.

The contents of flash may be overwritten.*

2. A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.)

Are the devices on the same LAN?

Do the devices have enough NVRAM to store the IOS image?

What models of routers and switches require upgrades?*

What ports are installed on the routers and switches?

Do the routers and switches have enough RAM and flash memory for the proposed IOS versions?*

What features are required for the devices?*

3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Use Telnet to remotely access the switch through the network.

Use the console port to locally access the switch from a serial or USB interface of the PC.*

Use Secure Shell to remotely access the switch through the network​.

Use the AUX port to locally access the switch from a serial or USB interface of the PC.

4. A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

Telnet

Console

AUX

SSH*

5. A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?

global configuration mode

setup mode

ROM monitor mode

user EXEC mode*

6. Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

providing an error message when a wrong command is submitted

displaying a list of all available commands within the current mode*

allowing the user to complete the remainder of an abbreviated command with the TAB key

determining which option, keyword, or argument is available for the entered command*

selecting the best command to accomplish a task

7. Why is it important to configure a hostname on a device?

a Cisco router or switch only begins to operate when its hostname is set

a hostname must be configured before any other parameters

to identify the device during remote access (SSH or telnet)*

to allow local access to the device through the console port

8. Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.)

numbers*

question mark

space

tab

dash*

9. What is a result of using the service password-encryption command on a Cisco network device?

The command encrypts the banner message.

The command encrypts the enable mode password.

All passwords in the configuration are not shown in clear text when viewing the configuration.*

A network administrator who later logs into the device will be required to enter an administrator password in order to gain access to the Cisco device.

10. A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

Reboot the device.

Enter CTRL-Z at the privileged mode prompt.

Exit global configuration mode.

Power cycle the device.

Exit privileged EXEC mode and press Enter.*

11. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface*

console interface*

Ethernet interface

boot IOS mode

privileged EXEC mode*

router configuration mode

12. While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

Issue the reload command without saving the running configuration.*

Delete the vlan.dat file and reboot the device.

Close and reopen the terminal emulation software.

Issue the copy startup-config running-config command.

13. Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.*

It is stored in NVRAM.

It should be deleted using the erase running-config command.

It is automatically saved when the router reboots.

14. Which interface allows remote management of a Layer 2 switch?

the AUX interface

the console port interface

the switch virtual interface*

the first Ethernet port interface

15. Why would a Layer 2 switch need an IP address?

to enable the switch to send broadcast frames to attached PCs

to enable the switch to function as a default gateway

to enable the switch to be managed remotely*

to enable the switch to receive frames from attached PCs

16. What benefit does DHCP provide to a network?

Hosts always have the same IP address and are therefore always reachable.

DHCP allows users to refer to locations by a name rather than an IP address.

Hosts can connect to the network and get an IP address without manual configuration.*

Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP and has static assignments.

17. What command can be used on a Windows PC to see the IP configuration of that computer?

ping

ipconfig*

show interfaces

show ip interface brief

18. What criterion must be followed in the design of an IPv4 addressing scheme for end devices?

Each IP address must match the address that is assigned to the host by DNS.

Each IP address must be unique within the local network.*

Each IP address needs to be compatible with the MAC address.

Each local host should be assigned an IP address with a unique network component.

19. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this?

The VLAN IP address and the default gateway IP address are not in the same network.

The local DNS server is not functioning correctly.

The no shutdown command was not issued for VLAN 1.*

The ip default-gateway command has to be issued in the VLAN interface configuration mode.

The default gateway address must be 192.168.10.1.

20. What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

if the TCP/IP stack is functioning on the PC without putting traffic on the wire

if there is connectivity with the destination device*

the path that traffic will take to reach the destination

what type of device is at the destination

21. Match the description to the common IOS CLI access method. (Not all options are used.)

Console port
It displays startup, debugging, and error messages by default.
It can be used to restore an out-of-box configuration on a switch or router.
Virtual interface
It allows access throught use of Telnet or SSH protocols.
It requires an active network connection.
AUX port
It connects throught dialup connections
It is not supported on Catalyst switch devices

22. Match the definitions to their respective CLI hot keys and shortcuts. (Not all options are used.)

CCNA 1 v5.02 ITN Chapter 1 Exam Answers

1. What two criteria are used to help select network media? (Choose two.)

the types of data that need to be prioritized

the cost of the end devices utilized in the network

the distance the media can successfully carry a signal*

the number of intermediary devices installed in the network

the environment where the media is to be installed*

2. What are two functions of intermediary devices on a network? (Choose two.)

They are the primary source and providers of information and services to end devices.

They run applications that support collaboration for business.

They form the interface between the human network and the underlying communication network.

They direct data along alternate pathways when there is a link failure.*

They filter the flow of data, based on security settings.*

3. Which device performs the function of determining the path that messages should take through internetworks?

a router*

a firewall

a web server

a DSL modem

4. Refer to the exhibit. Which set of devices contains only intermediary devices?

A, B, D, G*

A, B, E, F

C, D, G, I

G, H, I, J

5. Which two statements about the relationship between LANs and WANs are true? (Choose two.)

Both LANs and WANs connect end devices.

WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.​*

LANs connect multiple WANs together.

WANs must be publicly-owned, but LANs can be owned by either public or private entities.

WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals.*

6. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?

extranet

intranet

wired LAN

wireless LAN*

wireless WAN

7. What type of network must a home user access in order to do online shopping?

an intranet

the Internet*

an extranet

a local area network

8. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

DSL

cellular*

satellite*

dialup

dedicated leased line

9. Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.)​ Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.)​

cellular

DSL*

satellite

cable*

dial-up telephone

10. Which description correctly defines a converged network?

a single network channel capable of delivering multiple communication forms*

a network that allows users to interact directly with each other over multiple channels

a dedicated network with separate channels for video and voice services

a network that is limited to exchanging character-based information

11. Which statement describes a network that supports QoS?

The fewest possible devices are affected by a failure.

The network should be able to expand to keep up with user demand.

The network provides predictable levels of service to different types of traffic.*

Data sent over the network is not altered in transmission.

12. What is a characteristic of circuit-switched networks?

If all circuits are busy, a new call cannot be placed.*

If a circuit fails, the call will be forwarded on a new path.

Circuit-switched networks can dynamically learn and use redundant circuits.

A single message can be broken into multiple message blocks that are transmitted through multiple circuits simultaneously.

13. Which expression accurately defines the term congestion?

a method of limiting the impact of a hardware or software failure on the network

a measure of the data carrying capacity of the network

a state where the demand on the network resources exceeds the available capacity*

a set of techniques to manage the utilization of network resources

14. Which statement describes a characteristic of cloud computing?

A business can connect directly to the Internet without the use of an ISP.

Applications can be accessed over the Internet through a subscription.*

Devices can connect to the Internet through existing electrical wiring.

Investment in new infrastructure is required in order to access the cloud.

15. Which tool provides real-time video and audio communication over the Internet so that businesses can conduct corporate meetings with participants from several remote locations?

wiki

weblog

TelePresence*

instant messaging

16. Requiring strong, complex passwords is a practice that supports which network security goal?

maintaining communication integrity

ensuring reliability of access

ensuring data confidentiality*

ensuring redundancy

17. Which three network tools provide the minimum required security protection for home users? (Choose three.)

an intrusion prevention system

antivirus software*

antispyware software​*

access control lists

a firewall*

powerline networking

18. Fill in the blank.

The acronym _byod_  refers to the trend of end users being able to use their personal devices to access the business network and resources.

19. Match each definition to the corresponding security goal. (Not all options are used.)

maintaining integrity -> the assurance that the information has not been altered during transmission
ensuring confidentiality -> only the intended recipients can access and read the data
ensuring availability -> the assurance of timely and reliable access to data

20. Match each characteristic to its corresponding Internet connectivity type. (Not all options are used.)

satellite -> Not suited for heavily wooded areas
dialup telephone -> typically has very low bandwidth
DSL -> splits the access line into three signals
cable -> uses coaxial cable as a medium

21. Match the form of network communication with its description. (Not all options are used.)

Web pages that groups of people can edit and view together -> wiki
Interactive websites where people created and share user-generated content with friends and family ->Social media
real-time communication of between two or more people -> instant messaging
an audio-based medium that allows people to deliver their recordings to a wide audience -> podcast

22. What two criteria are used to help select a network medium from various network media? (Choose two.)

the types of data that need to be prioritized

the cost of the end devices utilized in the network

the distance the selected medium can successfully carry a signal*

the number of intermediary devices installed in the network

the environment where the selected medium is to be installed*