TN Netacad
TN Netacad
2. An employee wants to access the network of the organization remotely, in the safest
possible way. What network feature would allow an employee to gain secure remote
access to a company network?
ACL
IPS
VPN
BYOD
Explanation: Virtual private networks (VPN) are used to provide secure access to remote
workers.
Explanation: The Internet provides global connections that enable networked devices
(workstations and mobile devices) with different network technologies, such as Ethernet,
DSL/cable, and serial connections, to communicate. A private network for an organization
with LAN and WAN connections is an intranet.
Explanation: End devices originate the data that flows through the network. Intermediary
devices direct data over alternate paths in the event of link failures and filter the flow of data
to enhance security. Network media provide the channel through which network messages
travel.
Explanation: Wireless Internet Service Providers (WISPs) are typically found in rural areas
where DSL or cable access is not available. A dish or antenna on the property of the
subscriber connects wirelessly to a WISP transmitter, eliminating the need for physical
cabling outside the building.
6. What characteristic of a network enables it to quickly grow to support new users and
applications without impacting the performance of the service being delivered to
existing users?
reliability
scalability
quality of service
accessibility
Explanation: Networks must be able to quickly grow to support new users and services,
without impacting existing users and services. This ability to grow is known as scalability.
7. A college is building a new dormitory on its campus. Workers are digging in the
ground to install a new water pipe for the dormitory. A worker accidentally damages a
fiber optic cable that connects two of the existing dormitories to the campus data
center. Although the cable has been cut, students in the dormitories only experience a
very short interruption of network services. What characteristic of the network is
shown here?
quality of service (QoS)
scalability
security
fault tolerance
integrity
Explanation: Scalable networks are networks that can grow without requiring costly
replacement of existing network devices. One way to make a network scalable is to buy
networking devices that are modular.
9. Which device performs the function of determining the path that messages should
take through internetworks?
a router
a firewall
a web server
a DSL modem
Explanation: A router is used to determine the path that the messages should take through
the network. A firewall is used to filter incoming and outgoing traffic. A DSL modem is used
to provide Internet connection for a home or an organization.
10. Which two Internet connection options do not require that physical cables be run to
the building? (Choose two.)
DSL
cellular
satellite
dialup
dedicated leased line
Explanation: Cellular connectivity requires the use of the cell phone network. Satellite
connectivity is often used where physical cabling is not available outside the home or
business.
11. What type of network must a home user access in order to do online shopping?
an intranet
the Internet
an extranet
a local area network
Explanation: Home users will go online shopping over the Internet because online vendors
are accessed through the Internet. An intranet is basically a local area network for internal
use only. An extranet is a network for external partners to access certain resources inside an
organization. A home user does not necessarily need a LAN to access the Internet. For
example, a PC connects directly to the ISP through a modem.
12. During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that were visited
by users of the computer. Which type of threat is affecting this computer?
DoS attack
identity theft
spyware
zero-day attack
Explanation: Spyware is software that is installed on a network device and that collects
information.
13. Which term refers to a network that provides secure access to the corporate offices
by suppliers, customers and collaborators?
Internet
intranet
extranet
extendednet
Explanation: The term Internet refers to the worldwide collection of connected networks.
Intranet refers to a private connection of LANs and WANS that belong to an organization and
is designed to be accessible to the members of the organization, employees, or others with
authorization. Extranets provide secure and safe access to suppliers, customers, and
collaborators. Extendednet is not a type of network.
14. A large corporation has modified its network to allow users to access network
resources from their personal laptops and smart phones. Which networking trend does
this describe?
cloud computing
online collaboration
bring your own device
video conferencing
Explanation: BYOD allows end users to use personal tools to access the corporate network.
Allowing this trend can have major impacts on a network, such as security and compatibility
with corporate software and devices.
Explanation: Decoding is the process of receiving transmitted data and reversing the
encoding process to interpret the information. An example is a person that listens to a
voicemail and decodes the sounds to understand the received message.
Explanation: When messages are sent on a network, the encapsulation process works from
the top of the OSI or TCP/IP model to the bottom. At each layer of the model, the upper layer
information is encapsulated into the data field of the next protocol. For example, before an IP
packet can be sent, it is encapsulated in a data link frame at Layer 2 so that it can be sent
over the physical medium.
3. What process is used to place one message inside another message for transfer
from the source to the destination?
access control
decoding
encapsulation
flow control
Explanation: Encapsulation is the process of placing one message format into another
message format. An example is how a packet is placed in its entirety into the data field as it is
encapsulated into a frame.
4. A web client is sending a request for a webpage to a web server. From the
perspective of the client, what is the correct order of the protocol stack that is used to
prepare the request for transmission?
HTTP, IP, TCP, Ethernet
HTTP, TCP, IP, Ethernet
Ethernet, TCP, IP, HTTP
Ethernet, IP, TCP, HTTP
Explanation:
1. HTTP governs the way that a web server and client interact.
2. TCP manages individual conversations between web servers and clients.
3. IP is responsible for delivery across the best path to the destination.
4. Ethernet takes the packet from IP and formats it for transmission.
5. What are two benefits of using a layered network model? (Choose two.)
It assists in protocol design.
It speeds up packet delivery.
It prevents designers from creating their own model.
It prevents technology in one layer from affecting other layers.
It ensures a device at one layer can function at the next higher layer.
Explanation: Some vendors have developed their own reference models and protocols.
Today, if a device is to communicate on the Internet, the device must use the TCP/IP model.
The benefits of using a layered model are as follows:
Explanation: Protocols provide rules that define how a message is transmitted across a
network. Implementation requirements such as electronic and bandwidth details for data
communication are specified by standards. Operating systems are not specified by protocols,
but will implement protocols. Protocols determine how and when to send a message but they
do not control the contents of a message.
Explanation: The destination IP address is used for end-to-end delivery of data to a remote
network. The destination MAC address is used for delivery on a local network. The
destination port number identifies the application that should process the data at the
destination. Source addresses identify the sender of the data.
8. What is the general term that is used to describe a piece of data at any layer of a
networking model?
frame
packet
protocol data unit
segment
Explanation: The term protocol data unit (PDU) is used to describe a piece of data at any
layer of a networking model. A packet is the PDU at the network layer. A frame is the data link
layer PDU. A segment is the PDU at the transport layer.
10. Which layer of the OSI model defines services to segment and reassemble data for
individual communications between end devices?
application
presentation
session
transport
network
Explanation: The OSI model consists of seven layers: application, presentation, session,
transport, network, data link, and physical. The transport layer defines services to segment,
transfer, and reassemble the data for individual communications between the end devices.
11. Which type of communication will send a message to a group of host destinations
simultaneously?
broadcast
multicast
unicast
anycast
Explanation: TCP/IP is a protocol stack that contains a lot of other protocols such as HTTP,
FTP, and DNS. The TCP/IP protocol stack is required to be used when communicating on the
Internet. A MAC address is an address that is burned into an Ethernet network card. OSI is
the 7 layer model that is used to explain how networking works.
13. What type of communication will send a message to all devices on a local area
network?
broadcast
multicast
unicast
allcast
15. Which message delivery option is used when all devices need to receive the same
message simultaneously?
duplex
unicast
multicast
broadcast
Explanation: When all devices need to receive the same message simultaneously, the
message would be delivered as a broadcast. Unicast delivery occurs when one source host
sends a message to one destination host. The sending of the same message from a host to a
group of destination hosts is multicast delivery. Duplex communications refers to the ability of
the medium to carry messages in both directions.
16. What three requirements are defined by the protocols used in network
communcations to allow message transmission across a network? (Choose three.)
connector specifications
message encoding
media selection
message size
delivery options
end-device installation
17. What type of delivery uses data link layer addresses?
remote delivery
local and remote delivery
local delivery
remote delivery using routers
18. What layer of the TCP/IP protocol model determines the best path through the
network?
application
transport
internet
network access
Explanation: IANA oversees the management of IP address allocation and domain names.
ISO is the largest developer of international networking standards and is famous for the Open
Systems Interconnection (OSI) model. TIA focuses on communication standards. The IEEE
802 standards are many, but the ones that affect an entry-level network professional are
Ethernet (802.3), wireless LANs (802.11), and wireless PANs (802.15).
Explanation: When the end-user devices need mobility to connect to the network, wireless is
recommended. If an end-user device only has an Ethernet NIC, the user will only be able to
use Ethernet cabling. If RFI is an issue, wireless is not recommended. An end-user device
that requires a dedicated connection for performance would perform better with a dedicated
Ethernet cable.
Explanation: The NIC has responsibilities in both Layer 1 and Layer 2. The NIC encodes the
frame as a series of signals that are transmitted onto the local media. This is the responsibility
of the physical layer of the OSI model. The signal could be in the form of electrical, optical, or
radio waves.
4. What type of cable is used to connect a workstation serial port to a Cisco router
console port?
crossover
rollover
straight-through
coaxial
Explanation: UTP cable wire pairs can be terminated in different configurations for use in
different applications. To use a UTP cable for consoling into a Cisco router from a PC serial
port, it must be terminated as a rollover or console cable.
Explanation: Bandwidth is the measure of the capacity of a network medium to carry data. It
is the amount of data that can move between two points on the network over a specific period
of time, typically one second.
Explanation: Frame encoding converts a stream of data bits into a predefined code that is
recognized by both the sender and receiver. These codes are used for a variety of purposes,
such as distinguishing data bits from control bits, and identifying the beginning and end of a
frame.
Explanation: Cladding and immunization from electrical hazards are characteristics for fiber-
optic cabling. A woven copper braid or metallic foil is used as a shield for the inner coaxial
cable conductor. Cancellation is a property of UTP cabling where two wires are located
adjacent to one another so each magnetic field cancels out the adjacent magnetic field.
9. A wireless LAN is being deployed inside the new one room office that is occupied by
the park ranger. The office is located at the highest part of the national park. After
network testing is complete, the technicians report that the wireless LAN signal is
occasionally affected by some type of interference. What are two possible causes of
the signal distortion? (Choose two.)
the microwave oven
the large number of trees that surround the office
the cellular phones that are used by the employees
the elevated location where the wireless LAN was installed
the number of wireless devices that are used in the wireless LAN
Explanation: Wireless LAN connectivity is not affected by trees or the elevation of the
equipment. Because this is a one room office in an isolated area, there will not be a large
number of wireless devices or source of interference operating in the immediate vicinity, apart
from a cellular phone or a microwave oven.
Explanation: Throughput is the measure of the transfer of bits across the media over a given
period of time. Throughput is affected by a number of factors such as, EMI and latency, so it
rarely matches the specified bandwidth for a network medium. The throughput measurement
includes user data bits and other data bits, such as overhead, acknowledging, and
encapsulation. The measure of the usable data transferred across the media is called
goodput.
11. What is one advantage of using fiber optic cabling rather than copper cabling?
It is usually cheaper than copper cabling.
It is able to be installed around sharp bends.
It is easier to terminate and install than copper cabling.
It is able to carry signals much farther than copper cabling.
Explanation: Copper cabling is usually cheaper and easier to install than fiber optic cabling.
However, fiber cables generally have a much greater signaling range than copper.
Explanation: The physical layer is responsible for transmitting the actual signals across the
physical media as bits. Exchanging frames, controlling media access, and performing error
detection are all functions of the data link layer.
13. Why are two strands of fiber used for a single fiber optic connection?
The two strands allow the data to travel for longer distances without degrading.
They prevent crosstalk from causing interference on the connection.
They increase the speed at which the data can travel.
They allow for full-duplex connectivity.
Explanation: Light can only travel in one direction down a single strand of fiber. In order to
allow for full-duplex communication two strands of fiber must be connected between each
device.
Explanation: EMI and RFI can distort network signals because of interference from
fluorescent lights or electric motors. Attenuation results in deterioration of the network signal
as it travels along copper cabling. Wireless devices can experience loss of signals because of
excessive distances from a access point, but this is not crosstalk. Crosstalk is the disturbance
caused by the electric or magnetic fields of the signal carried on an adjacent wire within the
same cable.
15. Which procedure is used to reduce the effect of crosstalk in copper cables?
requiring proper grounding connections
twisting opposing circuit wire pairs together
wrapping the bundle of wires with metallic shielding
designing a cable infrastructure to avoid crosstalk interference
avoiding sharp bends during installation
16. Which statement describes a characteristic of the frame header fields of the data
link layer?
They all include the flow control and logical connection fields.
Ethernet frame header fields contain Layer 3 source and destination addresses.
They vary depending on protocols.
They include information on user applications.
Explanation: All data link layer protocols encapsulate the Layer 3 PDU within the data field of
the frame. However, the structure of the frame and the fields that are contained in the header
vary according to the protocol. Different data link layer protocols may use different fields, like
priority/quality of service, logical connection control, physical link control, flow control, and
congestion control.
17. Which two factors influence the method that is used for media access control?
(Choose two.)
how data is generated by end devices applications
how the connection between nodes appears to the data link layer
how signals are encoded by the NICs on end devices
how nodes share the media
how the IP protocol forwards the packet to the destination
18. What is a characteristic of a WAN hub-and-spoke topology?
It requires that some of the branch sites be interconnected through point-to-point links.
It requires that every site be interconnected to each other through point-to-point links.
All sites require a hub device that connects to a router.
The branch sites are connected to a central site through point-to-point links.
Explanation: The data link layer is responsible for the exchange of frames between nodes
over a physical network media. Specifically the data link layer performs two basic services:
Path determination is a service provided at Layer 3. A Layer 2 switch builds a MAC address
table as part of its operation, but path determination is not the service that is provided by the
data link layer.
Explanation: Routers are responsible for encapsulating a frame with a proper format for the
physical network media the routers connect. At each hop along the path, a router does the
following:
1. Accepts a frame from a medium
2. De-encapsulates the frame
3. Determines the best path to forward the packet
4. Re-encapsulates the packet into a new frame
5. Forwards the new frame appropriate to the medium of that segment of the physical network
3. What attribute of a NIC would place it at the data link layer of the OSI model?
attached Ethernet cable
IP address
MAC address
RJ-45 port
TCP/IP protocol stack
Explanation: The data link layer describes media access and physical addressing. The
encoding of a MAC address on a NIC places it at that layer. Ports and cables are placed at
the physical layer of the OSI model. IP addresses are placed at the network layer. The
TCP/IP protocol stack describes a different model.
Explanation: The use of Layer 2 switches operating in full-duplex mode eliminates collisions,
thereby eliminating the need for CSMA/CD.
5. What type of physical topology can be created by connecting all Ethernet cables to a
central device?
bus
ring
star
mesh
Explanation: Devices connected to the Ethernet star topology connect to either a hub or a
switch.
6. A technician has been asked to develop a physical topology for a network that
provides a high level of redundancy. Which physical topology requires that every node
is attached to every other node on the network?
bus
hierarchical
mesh
ring
star
Explanation: The mesh topology provides high availability because every node is connected
to all other nodes. Mesh topologies can be found in WANs. A partial mesh topology can also
be used where some, but not all, end points connect to one another.
Explanation: The data that is transmitted over the network can flow using one of three
modes:
9. Which data link layer media access control method does Ethernet use?
CSMA/CD
determinism
turn taking
token passing
10. What are the two sublayers of the OSI model data link layer? (Choose two.)
internet
physical
LLC
transport
MAC
network access
Explanation: The data link layer of the OSI model is divided into two sublayers: the Media
Access Control (MAC) sublayer and the Logical Link Control (LLC) sublayer.
Explanation: Carrier sense multiple access with collision avoidance (CSMA/CA) is used with
wireless networking technology to mediate media contention. Carrier sense multiple access
with collision detection (CSMA/CD) is used with wired Ethernet technology to mediate media
contention. Priority ordering and token passing are not used (or not a method) for media
access control.
12. What identifier is used at the data link layer to uniquely identify an Ethernet device?
IP address
MAC address
sequence number
TCP port number
UDP port number
Explanation: Ethernet frames are identified at the data link layer by their MAC addresses,
which are unique to each NIC. IP addresses are used at the network layer, and TCP and UDP
port numbers are used at the transport layer. Sequence numbers are fields in TCP headers.
13. Which two engineering organizations define open standards and protocols that
apply to the data link layer? (Choose two.)
International Organization for Standardization (ISO)
Internet Assigned Numbers Authority (IANA)
International Telecommunication Union (ITU)
Electronic Industries Alliance (EIA)
Internet Society (ISOC)
Explanation: The IANA is responsible for overseeing and managing IP address allocation,
domain name management, and protocol identifiers. The EIA is an international standards
and trade alliance for electronics organizations, and is best known for its standards related to
electrical wiring, connectors, and the 19-inch racks used to mount networking equipment. The
ISOC promotes the open development, evolution, and use of the Internet throughout the
world.
14. Which layer of the OSI model is responsible for specifying the encapsulation
method used for specific types of media?
application
transport
data link
physical
Explanation: Encapsulation is a function of the data link layer. Different media types require
different data link layer encapsulation.
Explanation: In an Ethernet network, each NIC in the network checks every arriving frame to
see if the destination MAC address in the frame matches its own MAC address. If there is no
match, the device discards the frame. If there is a match, the NIC passes the frame up to the
next OSI layer.
2. What is auto-MDIX?
a type of Cisco switch
an Ethernet connector type
a type of port on a Cisco switch
a feature that detects Ethernet cable type
Explanation: Auto-MDIX is a feature that is enabled on the latest Cisco switches and that
allows the switch to detect and use whatever type of cable is attached to a specific port.
3. Which two functions or operations are performed by the MAC sublayer? (Choose
two.)
It is responsible for Media Access Control.
It performs the function of NIC driver software.
It adds a header and trailer to form an OSI Layer 2 PDU.
It handles communication between upper and lower layers.
It adds control information to network protocol layer data.
Explanation: The MAC sublayer is the lower of the two data link sublayers and is closest to
the physical layer. The two primary functions of the MAC sublayer are to encapsulate the data
from the upper layer protocols and to control access to the media.
Explanation: The multicast MAC address is a special value that begins with 01-00-5E in
hexadecimal. It allows a source device to send a packet to a group of devices.
Explanation: In an attempt to conserve bandwidth and not forward useless frames, Ethernet
devices drop frames that are considered to be runt (less than 64 bytes) or jumbo (greater than
1500 bytes) frames.
6. What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose
two.)
56 bytes
64 bytes
128 bytes
1024 bytes
1518 bytes
Explanation: The minimum Ethernet frame is 64 bytes. The maximum Ethernet frame is
1518 bytes. A network technician must know the minimum and maximum frame size in order
to recognize runt and jumbo frames.
7. What addressing information is recorded by a switch to build its MAC address table?
the destination Layer 3 address of incoming packets
the destination Layer 2 address of outgoing frames
the source Layer 3 address of outgoing packets
the source Layer 2 address of incoming frames
Explanation: A switch builds a MAC address table by inspecting incoming Layer 2 frames
and recording the source MAC address found in the frame header. The discovered and
recorded MAC address is then associated with the port used to receive the frame.
Explanation: The 802.3 Ethernet standard specifies that a network implement the CSMA/CD
access control method.
Explanation: Any vendor selling Ethernet devices must register with the IEEE to ensure the
vendor is assigned a unique 24-bit code, which becomes the first 24 bits of the MAC address.
The last 24 bits of the MAC address are generated per hardware device. This helps to ensure
globally unique addresses for each Ethernet device.
10. What is the special value assigned to the first 24 bits of a multicast MAC address?
01-5E-00
FF-00-5E
FF-FF-FF
01-00-5E
Explanation: Just as with multicast IP addresses, there is a special assigned value for
multicast MAC addresses. The first 24 bits are set in hex to: 01-00-5E. The remaining 6 hex
digits are derived from the lower 23 bits of the IP multicast.
11. Which network device makes forwarding decisions based on the destination MAC
address that is contained in the frame?
repeater
hub
switch
router
Explanation: Switches are the central connection point for a LAN and they maintain a MAC
address table. The MAC address table has a port number associated with a MAC address for
each particular device. The switch inspects a frame to look at the destination MAC address.
The switch then looks in its MAC address table and if that MAC address is found, the switch
forwards the data to the port that is associated with that particular MAC address.
12. Which network device has the primary function to send data to a specific
destination based on the information found in the MAC address table?
hub
router
switch
modem
Explanation: If a MAC address is found in the MAC address table, then data is sent to the
associated switch port. If the MAC address is not found in the MAC address table, the data is
sent to all switch ports that have devices attached to the same network.
Explanation: The Ethernet LLC sublayer has the responsibility to handle communication
between the upper layers and the lower layers of the protocol stack. The LLC is implemented
in software and communicates with the upper layers of the application to transition the packet
to the lower layers for delivery.
Explanation: A MAC address is composed of 6 bytes. The first 3 bytes are used for vendor
identification and the last 3 bytes must be assigned a unique value within the same OUI. MAC
addresses are implemented in hardware. A NIC needs a MAC address to communicate over
the LAN. The IEEE regulates the MAC addresses.
8.6.2 Module Quiz – Network Layer Answers
1. Which command can be used on a Windows host to display the routing table?
netstat -s
show ip route
netstat -r
tracert
Explanation: On a Windows host, either the route print or netstat -r commands can be
used to display the host routing table. The show ip route command is used on a router to
display its routing table. The netstat –s command is used to display per-protocol statistics.
The tracert command is used to display the path that a packet travels to its destination.
Explanation: IP is a Layer 3 protocol. Layer 3 devices can open the Layer 3 header to
inspect the Layer 3 header which contains IP-related information including the source and
destination IP addresses.
Explanation: The data link layer indicates to the network layer the MTU for the medium that
is being used. The network layer uses that information to determine how large the packet can
be when it is forwarded. When packets are received on one medium and forwarded on a
medium with a smaller MTU, the network layer device can fragment the packet to
accommodate the smaller size.
Explanation: IPv6 addresses are based on 128-bit hierarchical addressing, and the IPv6
header has been simplified with fewer fields, improving packet handling. IPv6 natively
supports authentication and privacy capabilities as opposed to IPv4 that needs additional
features to support those. The IPv6 address space is many times bigger than IPv4 address
space.
5. When a connectionless protocol is in use at a lower layer of the OSI model, how is
missing data detected and retransmitted if necessary?
Connectionless acknowledgements are used to request retransmission.
Upper-layer connection-oriented protocols keep track of the data received and can
request retransmission from the upper-level protocols on the sending host.
Network layer IP protocols manage the communication sessions if connection-oriented
transport services are not available.
The best-effort delivery process guarantees that all packets that are sent are received.
Explanation: When connectionless protocols are in use at a lower layer of the OSI model,
upper-level protocols may need to work together on the sending and receiving hosts to
account for and retransmit lost data. In some cases, this is not necessary, because for some
applications a certain amount of data loss is tolerable.
6. What was the reason for the creation and implementation of IPv6?
to make reading a 32-bit address easier
to relieve IPv4 address depletion
to provide more address space in the Internet Names Registry
to allow NAT support for private addressing
Explanation: IPv4 addressing space is exhausted by the rapid growth of the Internet and the
devices connected to the Internet. IPv6 expands the IP addressing space by increasing the
address length from the 32 bits to 128 bits, which should provide sufficient addresses for
future Internet growth needs for many years to come.
Explanation: IPv4 has a 32-bit address space, providing 4,294,967,296 unique addresses,
but only 3.7 billion are assignable, a limit due to address reservation for multicasting and
testing. IPv4 does not provide native support for IPsec. IPv6 has a simplified header with
fewer fields than IPv4 has.
8. Which field in an IPv4 packet header will typically stay the same during its
transmission?
Flag
Time-to-Live
Packet Length
Destination Address
Explanation: The value in the Destination Address field in an IPv4 header will stay the same
during its transmission. The other options might change during its transmission.
9. When a router receives a packet, what information must be examined in order for the
packet to be forwarded to a remote destination?
destination MAC address
source IP address
destination IP address
source MAC address
Explanation: When a router receives a packet, it examines the destination address of the
packet and uses the routing table to search for the best path to that network.
10. Which field in an IPv6 packet is used by the router to determine if a packet has
expired and should be dropped?
TTL
Hop Limit
Address Unreachable
No Route to Destination
Explanation: ICMPv6, like IPv4, sends a Time Exceeded message if the router cannot
forward an IPv6 packet because the packet has expired. However, the IPv6 packet does not
have a TTL field. Instead, it uses the Hop Limit field to determine if the packet has expired.
11. Which information is used by routers to forward a data packet toward its
destination?
source IP address
destination IP address
source data-link address
destination data-link address
Explanation: The destination IP address is the IP address for the receiving device. This IP
address is used by routers to forward the packet to its destination.
12. A computer has to send a packet to a destination host in the same LAN. How will
the packet be sent?
The packet will be sent to the default gateway first, and then, depending on the response
from the gateway, it may be sent to the destination host.
The packet will be sent directly to the destination host.
The packet will first be sent to the default gateway, and then from the default gateway it
will be sent directly to the destination host.
The packet will be sent only to the default gateway.
Explanation: If the destination host is in the same LAN as the source host, there is no need
for a default gateway. A default gateway is needed if a packet needs to be sent outside the
LAN.
13. A router receives a packet from the Gigabit 0/0 interface and determines that the
packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do
next?
route the packet out the Gigabit 0/1 interface
create a new Layer 2 Ethernet frame to be sent to the destination
look into the ARP cache to determine the destination IP address
look into the routing table to determine if the destination network is in the routing table
Explanation: Once a router receives a packet and looks inside the header to determine the
destination network, the router compares the destination network to the routing table to
determine if the packet is to be routed or dropped. If routed, the router attaches a new Layer 2
header based on the technology that is used by the outgoing port that is used. The packet is
then routed out the destination port as designated by the routing table. The ARP cache is
used to match an IP address with a MAC address.
14. Which IPv4 address can a host use to ping the loopback interface?
126.0.0.1
127.0.0.0
126.0.0.0
127.0.0.1
Explanation: The purpose of an ARP request is to find the MAC address of the destination
host on an Ethernet LAN. The ARP process sends a Layer 2 broadcast to all devices on the
Ethernet LAN. The frame contains the IP address of the destination and the broadcast MAC
address, FFFF.FFFF.FFFF.
Explanation: ARP, or the Address Resolution Protocol, works by mapping a destination MAC
address to a destination IPv4 address. The host knows the destination IPv4 address and uses
ARP to resolve the corresponding destination MAC address.
3. What will a Layer 2 switch do when the destination MAC address of a received frame
is not in the MAC table?
It initiates an ARP request.
It broadcasts the frame out of all ports on the switch.
It notifies the sending host that the frame cannot be delivered.
It forwards the frame out of all ports except for the port at which the frame was
received.
Explanation: A Layer 2 switch determines how to handle incoming frames by using its MAC
address table. When an incoming frame contains a destination MAC address that is not in the
table, the switch forwards the frame out all ports, except for the port on which it was received.
4. Which two ICMPv6 messages are used during the Ethernet MAC address resolution
process? (Choose two.)
router solicitation
router advertisement
neighbor solicitation
neighbor advertisement
echo request
Explanation: IPv6 uses neighbor solicitation (NS) and neighbor advertisement (NA) ICMPv6
messages for MAC address resolution.
5. Which router component holds the routing table, ARP cache, and running
configuration file?
RAM
Flash
NVRAM
ROM
Explanation: The routing table, ARP cache, and running configuration file are stored in
volatile RAM.
Explanation: ARP tables are used to store mappings of IP addresses to MAC addresses.
When a network device needs to forward a packet, the device knows only the IP address. To
deliver the packet on an Ethernet network, a MAC address is needed. ARP resolves the MAC
address and stores it in an ARP table.
7. A PC is configured to obtain an IP address automatically from network
192.168.1.0/24. The network administrator issues the arp –a command and notices an
entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?
This is a static map entry.
This is a dynamic map entry.
This entry refers to the PC itself.
This entry maps to the default gateway.
Explanation: ARP is a protocol used with IPv4 to map a MAC address to an associated
specific IP address. The command arp -a will display the MAC address table on a Windows
PC.
Explanation: Resolving IPv4 addresses to MAC addresses is one function of ARP. ARP is
also responsible for maintaining the ARP table.
Explanation: When a Layer 2 switch receives a frame with a broadcast destination address,
it floods the frame to all ports except the port on which it received the frame.
Explanation: The ARP process is used to complete the necessary mapping of IP and MAC
addresses that are stored in the ARP table that is maintained by each node on a LAN. When
the destination device is not on the same network as the source device, the MAC address of
the Layer 3 device on the the source network is discovered and added to the ARP table of the
source node.
14. The ARP table in a switch maps which two types of address together?
Layer 3 address to a Layer 2 address
Layer 3 address to a Layer 4 address
Layer 4 address to a Layer 2 address
Layer 2 address to a Layer 4 address
Explanation: The switch ARP table keeps a mapping of Layer 2 MAC addresses to Layer 3
IP addresses. These mappings can be learned by the switch dynamically through ARP or
statically through manual configuration.
Explanation: The two main functions of the ARP protocol are to resolve an IPv4 address to a
MAC address and to maintain an ARP table, which lists the resolved pairs of IPv4 address
and MAC address. A device automatically obtains an IP address through DHCP. The
functions of DNS include resolving (or mapping) a domain name with its IP address and
maintaining a table for the domain name/IP pairs.
Explanation: The /24 shows that the network address is 172.17.4.0. The broadcast address
for this network would be 172.17.4.255. Useable host addresses for this network are
172.17.4.1 through 172.17.4.254.
2. If a network device has a mask of /28, how many IP addresses are available for hosts
on this network?
256
254
62
32
16
14
Explanation: A /28 mask is the same as 255.255.255.240. This leaves 4 host bits. With 4
host bits, 16 IP addresses are possible, but one address represents the subnet number and
one address represents the broadcast address. 14 addresses can then be used to assign to
network devices.
Explanation: With the IPv4 address, a subnet mask is also necessary. A subnet mask is a
special type of IPv4 address that coupled with the IP address determines the subnet of which
the device is a member.
Explanation: The subnet mask 255.255.255.224 is equivalent to the /27 prefix. This leaves 5
5
bits for hosts, providing a total of 30 usable IP addresses (2 = 32 – 2 = 30).
Explanation: The slash notation /20 represents a subnet mask with 20 1s. This would
translate to: 11111111.11111111.11110000.0000, which in turn would convert into
255.255.240.0.
7. Why does a Layer 3 device perform the ANDing process on a destination IP address
and subnet mask?
to identify the broadcast address of the destination network
to identify the host address of the destination host
to identify faulty frames
to identify the network address of the destination network
Explanation: ANDing allows us to identify the network address from the IP address and the
network mask.
Explanation: A /27 mask is the same as 255.255.255.224. This leaves 5 host bits. With 5
host bits, 32 IP addresses are possible, but one address represents the subnet number and
one address represents the broadcast address. Thus, 30 addresses can then be used to
assign to network devices.
9. Which subnet mask would be used if exactly 4 host bits are available?
255.255.255.224
255.255.255.128
255.255.255.240
255.255.255.248
Explanation: The subnet mask of 255.255.255.224 has 5 host bits. The mask of
255.255.255.128 results in 7 host bits. The mask of 255.255.255.240 has 4 host bits. Finally,
255.255.255.248 represents 3 host bits.
10. Which two parts are components of an IPv4 address? (Choose two.)
subnet portion
network portion
logical portion
host portion
physical portion
broadcast portion
Explanation: An IPv4 address is divided into two parts: a network portion – to identify the
specific network on which a host resides, and a host portion – to identify specific hosts on a
network. A subnet mask is used to identify the length of each portion.
11. If a network device has a mask of /26, how many IP addresses are available for
hosts on this network?
64
30
62
32
16
14
Explanation: A /26 mask is the same as 255.255.255.192. This leaves 6 host bits. With 6
host bits, 64 IP addresses are possible, but one address represents the subnet number and
one address represents the broadcast address. Thus 62 addresses can then be assigned to
network hosts.
12. What is the prefix length notation for the subnet mask 255.255.255.224?
/25
/26
/27
/28
Explanation: The binary format for 255.255.255.224 is
11111111.11111111.11111111.11100000. The prefix length is the number of consecutive 1s
in the subnet mask. Therefore, the prefix length is /27.
13. How many valid host addresses are available on an IPv4 subnet that is configured
with a /26 mask?
254
190
192
62
64
Explanation: When a /26 mask is used, 6 bits are used as host bits. With 6 bits, 64
addresses are possible, but one address is for the subnet number and one address is for a
broadcast. This leaves 62 addresses that can be assigned to network devices.
14. Which subnet mask would be used if 5 host bits are available?
255.255.255.0
255.255.255.128
255.255.255.224
255.255.255.240
Explanation: The subnet mask of 255.255.255.0 has 8 host bits. The mask of
255.255.255.128 results in 7 host bits. The mask of 255.255.255.224 has 5 host bits. Finally,
255.255.255.240 represents 4 host bits.
15. A network administrator subnets the 192.168.10.0/24 network into subnets with /26
masks. How many equal-sized subnets are created?
1
2
4
8
16
64
Explanation: The normal mask for 192.168.10.0 is /24. A /26 mask indicates 2 bits have
been borrowed for subnetting. With 2 bits, four subnets of equal size could be created.