Which statement describes the physical topology for Al?

Network Security 1.0 – System Test Exam Answers

  • Recommend

Network Security 1.0
Final Exam Answers
This Chapters 1 - 4
Chapters 1 - 4 Exam AnswersOnline Test
Next Chapters 5 - 7
Chapters 5 - 7 Exam AnswersOnline Test
Network Security Packet Tracer ActivityFiles Answers
4.4.8 Packet Tracer – Configure Secure Passwords and SSH Answers
Network Security Student Lab Source Files Answers
2.4.8 Lab – Social Engineering Answers
4.4.7 Lab – Configure Secure Administrative Access Answers
4.4.9 Lab – Configure Network Devices with SSH Answers

Show

CCNA4 Chapter 9 Exam (v5.03) Answer 2016

  1. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?

    • the power outlet to the PC that is used by the caller
    • the trunks between switches in the wiring closet
    • the status of the departmental workgroup switch in the wiring closet
    • the cable that connects the PC of the caller to the network jack
    • the cable connection between a PC and a network outlet that is used by a neighbor
  2. Which statement describes the physical topology for a LAN?

    • It depicts the addressing scheme that is employed in the LAN.
    • It describes whether the LAN is a broadcast or token-passing network.
    • It defines how hosts and network devices connect to the LAN.
    • It shows the order in which hosts access the network.
  3. When should a network performance baseline be measured?

    • during normal work hours of an organization
    • immediately after the main network devices restarted
    • after normal work hours to reduce possible interruptions
    • when a denial of service attack to the network is detected and blocked
  4. What is a purpose of establishing a network baseline?

    • It provides a statistical average for network performance.
    • It manages the performance of network devices.
    • It creates a point of reference for future network evaluations.
    • It checks the security configuration of network devices.
  5. In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

    • Document the symptoms.
    • Determine the symptoms.
    • Gather information.
    • Determine ownership.
    • Narrow the scope.
  6. A network technician is troubleshooting an email connection problem. Which question to the end-user will provide clear information to better define the problem?

    • Is your email working now?
    • How big are the emails you tried to send?
    • What kind of equipment are you using to send emails?
    • When did you first notice your email problem?
  7. A team of engineers has identified a solution to a significant network problem. The proposed solution is likely to affect critical network infrastructure components. What should the team follow while implementing the solution to avoid interfering with other processes and infrastructure?

    • change-control procedures
    • one of the layered troubleshooting approaches
    • knowledge base guidelines
    • syslog messages and reports
  8. After which step in the network troubleshooting process would one of the layered troubleshooting methods be used?

    • documenting symptoms
    • determining ownership
    • narrowing the scope
    • gathering symptoms from suspect devices
  9. A network engineer is troubleshooting a network problem and can successfully ping between two devices. However, Telnet between the same two devices does not work. Which OSI layers should the administrator investigate next?

    • all of the layers
    • from the network layer to the application layer
    • from the network layer to the physical layer
    • only the network layer
  10. Which troubleshooting method begins by examining cable connections and wiring issues?

    • top-down
    • bottom-up
    • substitution
    • divide-and-conquer
  11. Which number represents the most severe level of syslog logging?

    • 0
    • 1
    • 7
    • 10
    • 100
  12. A company is setting up a web site with SSL technology to protect the authentication credentials required to access the web site. A network engineer needs to verify that the setup is correct and that the authentication is indeed encrypted. Which tool should be used?

    • fault-management tool
    • protocol analyzer
    • baselining tool
    • cable analyzer
  13. Which two specialized troubleshooting tools can monitor the amount of traffic that passes through a switch? (Choose two.)

    • TDR
    • digital multimeter
    • NAM
    • portable network analyzer
    • DTX cable analyzer
  14. Which type of tool would an administrator use to capture packets that are going to and from a particular device?

    • NMS tool
    • knowledge base
    • baselining tool
    • protocol analyzer
  15. An administrator is troubleshooting an Internet connectivity problem on a router. The output of the show interfaces gigabitethernet 0/0 command reveals higher than normal framing errors on the interface that connects to the Internet. At what layer of the OSI model is the problem likely occurring?

    • Layer 1
    • Layer 2
    • Layer 3
    • Layer 4
    • Layer 7
  16. Users report that the new web site http://www.company1.biz cannot be accessed. The helpdesk technician checks and verifies that the web site can be accessed with http://www.company1.biz:90. Which layer in the TCP/IP model is involved in troubleshooting this issue?

    • application
    • transport
    • internet
    • network access
    • cabling faults
    • corrupted NIC driver
    • Ethernet signal attenuation
    • corrupted application installation
  17. The newly configured ASBR that connects a company to the Internet has a default route configured and has the default-information originate command entered. Devices connected through this router can access the Internet. The problem is that no other OSPF routers have a default route in the routing table and no other users throughout the organization can access the Internet. What could be the problem?

    • The ASBR does not have OSPF configured.
    • The ASBR does not have an OSPF neighbor.
    • The other routers are not configured to accept LSA type 4s.
    • The ASBR should use the exit_interface argument instead of next-hop on the default route.
  18. A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)

    • arp -a
    • ipconfig
    • nslookup
    • ping
    • telnet
    • tracert
    • netsh interface ipv6 show neighbor
  19. A networked PC is having trouble accessing the Internet, but can print to a local printer and ping other computers in the area. Other computers on the same network are not having any issues. What is the problem?

    • The PC has a missing or incorrect default gateway.
    • The default gateway router does not have a default route.
    • The switch port to which the PC connects has an incorrect VLAN configured.
    • The link between the switch to which the PC connects and the default gateway router is down.
  20. An internal corporate server can be accessed by internal PCs, but not by external Internet users that should have access. What could be the issue?

    • Static NAT has not been configured properly or at all.
    • The server does not have a private IP address assigned.
    • The default gateway router for the server does not have a default route.
    • The switch port to which the server connects has an incorrect VLAN configured.
  21. Fill in the blank.

    Use the ARP cache to verify IPv4 address to Layer 2 Ethernet address mappings on a host computer.

  22. Match the troubleshooting tool to the correct category. (Not all options are used.)

    • Question
      Which statement describes the physical topology for Al?
      CCNA4 Chapter 9 Exam v5.03 Question 001
    • Answer
      Which statement describes the physical topology for Al?
      CCNA4 Chapter 9 Exam v5.03 Answer 001

Exam Chapter 8 Questions and Answers CCNA 4 V6.0

An internal corporate server can be accessed by internal PCs, but not by external Internet users that should have access. What could be the issue?

The default gateway router for the server does not have a default route.

The server does not have a private IP address assigned.

The switch port to which the server connects has an incorrect VLAN configured.

Static NAT has not been configured properly or at all.

¡ Correcto ! ¡ Incorrecto !

A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?

the trunks between switches in the wiring closet

the cable connection between a PC and a network outlet that is used by a neighbor

the cable that connects the PC of the caller to the network jack

the status of the departmental workgroup switch in the wiring closet

the power outlet to the PC that is used by the caller

¡ Correcto ! ¡ Incorrecto !

A network administrator is configuring SSH on a router. When verifying the configuration, the administrator notices that the SSH connection requests fail, but the Telnet connection requests from the same workstation are successful. Which two parts of the router configuration should be checked to try to locate the problem? (Choose two.)

Por favor, selecciona 2 respuestas correctas

The ip access-class command is missing.

An extended ACL that is referencing the port argument for SSH is misconfigured.

The transport input command is incorrect on the vty lines.

The password is misconfigured on the console line.

A standard ACL is possibly blocking the workstation from access to the router.

¡ Correcto ! ¡ Incorrecto !

Users report that the new web site http://www.company1.biz cannot be accessed. The helpdesk technician checks and verifies that the web site can be accessed with http://www.company1.biz:90. Which layer in the TCP/IP model is involved in troubleshooting this issue?

network access

internet

transport

application

¡ Correcto ! ¡ Incorrecto !

A company is setting up a web site with SSL technology to protect the authentication credentials required to access the web site. A network engineer needs to verify that the setup is correct and that the authentication is indeed encrypted. Which tool should be used?

protocol analyzer

fault-management tool

baselining tool

cable analyzer

¡ Correcto ! ¡ Incorrecto !

A user reports that after an OS patch of the networking subsystem has been applied to a workstation, it performs very slowly when connecting to network resources. A network technician tests the link with a cable analyzer and notices that the workstation sends an excessive number of frames smaller than 64 bytes and also other meaningless frames. What is the possible cause of the problem?

Ethernet signal attenuation

corrupted NIC driver

cabling faults

corrupted application installation

¡ Correcto ! ¡ Incorrecto !

Which type of tool would an administrator use to capture packets that are going to and from a particular device?

protocol analyzer

baselining tool

knowledge base

NMS tool

¡ Correcto ! ¡ Incorrecto !

A user reports that the workstation cannot connect to a networked printer in the office in order to print a report created with word processing software. Which troubleshooting action by the helpdesk technician would follow the divide-and-conquer approach?

Ask the user to issue the ipconfig command.

Ask the user to launch the web browser.

Ask the user to unplug and reattach the network cable.

Ask the user to save the working document.

¡ Correcto ! ¡ Incorrecto !

Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?

syslog records and messages

the network performance baseline

debug output and packet captures

network configuration files

¡ Correcto ! ¡ Incorrecto !

A network technician is troubleshooting an email connection problem. Which question to the end-user will provide clear information to better define the problem?

What kind of equipment are you using to send emails?

When did you first notice your email problem?

Is your email working now?

How big are the emails you tried to send?

¡ Correcto ! ¡ Incorrecto !

A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)

Por favor, selecciona 3 respuestas correctas

ipconfig

tracert

telnet

arp -a

netsh interface ipv6 show neighbor

ping

nslookup

¡ Correcto ! ¡ Incorrecto !

Match the troubleshooting tool to the correct category. (Not all options are used.)

Which statement describes the physical topology for Al?

Place the options in the following order:
[+] CiscoView
[+] What’s Up Gold
[+] HP OpenviewBTO
[#] SolarWinds LAN surveyor
[#] CyberGauge software
[*] Internet search engines
[*] Cisco Tools & Resources web site

¡ Correcto ! ¡ Incorrecto !

Refer to the exhibit. Which two statements describe the results of entering these commands? (Choose two.)

Which statement describes the physical topology for Al?

Por favor, selecciona 2 respuestas correctas

R1 will reset all the warnings to clear the log.

R1 will output the system messages to the local RAM.

R1 will send system messages of levels 0 (emergencies) to level 4 (warnings) to a server.

R1 will not send critical system messages to the server until the command debug all is entered.

The syslog server has the IPv4 address 192.168.10.10.

¡ Correcto ! ¡ Incorrecto !

The newly configured ASBR that connects a company to the Internet has a default route configured and has the default-information originate command entered. Devices connected through this router can access the Internet. The problem is that no other OSPF routers have a default route in the routing table and no other users throughout the organization can access the Internet. What could be the problem?

The ASBR does not have an OSPF neighbor.

The ASBR should use the exit_interface argument instead of next-hop on the default route.

The ASBR does not have OSPF configured.

The other routers are not configured to accept LSA type 4s.

¡ Correcto ! ¡ Incorrecto !

A networked PC is having trouble accessing the Internet, but can print to a local printer and ping other computers in the area. Other computers on the same network are not having any issues. What is the problem?

The default gateway router does not have a default route.

The PC has a missing or incorrect default gateway.

The switch port to which the PC connects has an incorrect VLAN configured.

The link between the switch to which the PC connects and the default gateway router is down.

¡ Correcto ! ¡ Incorrecto !

Which troubleshooting method begins by examining cable connections and wiring issues?

top-down

substitution

divide-and-conquer

bottom-up

¡ Correcto ! ¡ Incorrecto !

Refer to exhibit. A network engineer is troubleshooting a WAN connectivity problem. A ping to a remote router is successful and an attempt to telnet to the same router displays the exhibited output. What does the output verify?

Which statement describes the physical topology for Al?

The web server service is password protected.

The transport layer is connecting successfully.

The remote router IPv6 address is incorrect.

A Telnet password has not been configured on the remote router.

¡ Correcto ! ¡ Incorrecto !

Fill in the blank.
Use the __ cache to verify IPv4 address to Layer 2 Ethernet address mappings on a host computer.

ARP

¡ Correcto ! ¡ Incorrecto !

Which two specialized troubleshooting tools can monitor the amount of traffic that passes through a switch? (Choose two.)

Por favor, selecciona 2 respuestas correctas

DTX cable analyzer

NAM

digital multimeter

TDR

portable network analyzer

¡ Correcto ! ¡ Incorrecto !

What is a purpose of establishing a network baseline?

It manages the performance of network devices.

It provides a statistical average for network performance.

It creates a point of reference for future network evaluations.

It checks the security configuration of network devices.

¡ Correcto ! ¡ Incorrecto !

Which statement describes the physical topology for a LAN?

It depicts the addressing scheme that is employed in the LAN.

It shows the order in which hosts access the network.

It describes whether the LAN is a broadcast or token-passing network.

It defines how hosts and network devices connect to the LAN.

¡ Correcto ! ¡ Incorrecto !

An administrator is troubleshooting an Internet connectivity problem on a router. The output of the show interfaces gigabitethernet 0/0 command reveals higher than normal framing errors on the interface that connects to the Internet. At what layer of the OSI model is the problem likely occurring?

Layer 7

Layer 2

Layer 4

Layer 1

Layer 3

¡ Correcto ! ¡ Incorrecto !

After which step in the network troubleshooting process would one of the layered troubleshooting methods be used?

narrowing the scope

documenting symptoms

determining ownership

gathering symptoms from suspect devices

¡ Correcto ! ¡ Incorrecto !

A team of engineers has identified a solution to a significant network problem. The proposed solution is likely to affect critical network infrastructure components. What should the team follow while implementing the solution to avoid interfering with other processes and infrastructure?

syslog messages and reports

change-control procedures

knowledge base guidelines

one of the layered troubleshooting approaches

¡ Correcto ! ¡ Incorrecto !

After cables were reconnected to a switch in a wiring closet, several PCs that had been previously configured manually can no longer access resources outside the local network. The PC configurations were not altered in the process and resources on the local network can still be accessed. What is a possible cause of the problem?

The DNS configuration on the PCs is incorrect.

The cabling to the PCs is faulty.

The DHCP server has been misconfigured.

The PCs are no longer on the correct VLAN.

¡ Correcto ! ¡ Incorrecto !

A network engineer is troubleshooting a network problem and can successfully ping between two devices. However, Telnet between the same two devices does not work. Which OSI layers should the administrator investigate next?

all of the layers

from the network layer to the physical layer

only the network layer

from the network layer to the application layer

¡ Correcto ! ¡ Incorrecto !

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

Gather information.

Document the symptoms.

Determine ownership.

Narrow the scope.

Determine the symptoms.

¡ Correcto ! ¡ Incorrecto !

When should a network performance baseline be measured?

after normal work hours to reduce possible interruptions

immediately after the main network devices restarted

when a denial of service attack to the network is detected and blocked

during normal work hours of an organization

¡ Correcto ! ¡ Incorrecto !

Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)

Which statement describes the physical topology for Al?

Por favor, selecciona 2 respuestas correctas

The average transmission time between the two hosts is 2 miliseconds.

There is connectivity between this device and the device at 192.168.100.1.

The connectivity between these two hosts allows for videoconferencing calls.

This host does not have a default gateway configured.

There are 4 hops between this device and the device at 192.168.100.1.

¡ Correcto ! ¡ Incorrecto !

A network engineer issues the show cdp neighbor command on several network devices during the process of network documentation. What is the purpose of performing this command?

to check the connectivity of PCs that are connected to the network devices

to check the networks that are advertised by the neighboring routers

to obtain information about directly connected Cisco devices

to verify the network addresses that are attached to the network devices

¡ Correcto ! ¡ Incorrecto !

Which number represents the most severe level of syslog logging?

10

100

0

7

1

¡ Correcto ! ¡ Incorrecto !

CCNA 4 Chapter 9 v6 Exam Answers

Final Score

Which statement describes the physical topology for Al?

Congratulations, you have completed the Chapter 9 Exam of CCNA 4! Tell us your rating!

Comparte tus Resultados:

Facebook Twitter VK

CCNA 1 v7 Modules 4 – 7: Ethernet Concepts Exam Answers

1. What is the purpose of the OSI physical layer?

controlling access to media
transmitting bits across the local media*
performing error detection on received frames
exchanging frames between nodes over physical network media

2. Why are two strands of fiber used for a single fiber optic connection?

The two strands allow the data to travel for longer distances without degrading.
They prevent crosstalk from causing interference on the connection.
They increase the speed at which the data can travel.
They allow for full-duplex connectivity.*

3. Which characteristic describes crosstalk?

the distortion of the network signal from fluorescent lighting
the distortion of the transmitted messages from signals carried in adjacent wires*
the weakening of the network signal over long cable lengths
the loss of wireless signal over excessive distance from the access point

4. Which procedure is used to reduce the effect of crosstalk in copper cables?

requiring proper grounding connections
twisting opposing circuit wire pairs together*
wrapping the bundle of wires with metallic shielding
designing a cable infrastructure to avoid crosstalk interference
avoiding sharp bends during installation

5. Match the situation with the appropriate use of network media.

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p5

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p5

6. A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

the amount of traffic that is currently crossing the network*
the sophistication of the encapsulation method applied to the data
the type of traffic that is crossing the network*
the latency that is created by the number of network devices that the data is crossing*
the bandwidth of the WAN connection to the Internet
the reliability of the gigabit Ethernet infrastructure of the backbone

7. What are two characteristics of fiber-optic cable? (Choose two.)

It is not affected by EMI or RFI.*
Each pair of cables is wrapped in metallic foil.
It combines the technique of cancellation, shielding, and twisting to protect data.
It typically contains 4 pairs of fiber-optic wires.
It is more expensive than UTP cabling is.*

8. What is a primary role of the Physical layer in transmitting data on the network?

create the signals that represent the bits in each frame on to the media*
provide physical addressing to the devices
determine the path packets take through the network
control data access to the media

Explanation:The OSI physical layer provides the means to transport the bits that make up a frame across the network media. This layer accepts a complete frame from the data link layer and encodes it as a series of signals that are transmitted to the local media.

9. With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?

the magnetic field around the adjacent pairs of wire*
the use of braided wire to shield the adjacent wire pairs
the reflection of the electrical wave back from the far end of the cable
the collision caused by two nodes trying to use the media simultaneously

Explanation:Crosstalk is a type of noise, or interference that occurs when signal transmission on one wire interferes with another wire. When current flows through a wire a magnetic field is produced. The produced magnetic field will interface the signal carried in the adjacent wire.

10. Refer to the graphic.

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p10

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p10

What type of cabling is shown?

STP
UTP
coax
fiber*

Explanation:Network cabling include different types of cables:
UTP cable consists of four pairs of color-coded wires that have been twisted together and then encased in a flexible plastic sheath.
STP cable uses four pairs of wires, each wrapped in a foil shield, which are then wrapped in an overall metallic braid or foil.
Coaxial cable uses a copper conductor and a layer of flexible plastic insulation surrounds the copper conductor.
Fiber cable is a flexible, extremely thin, transparent strand of glass surrounded by plastic insulation.

11. In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)

Crosstalk*
bandwidth
size of the network
signal modulation technique
electromagnetic interference*

Explanation:Copper media is widely used in network communications. However, copper media is limited by distance and signal interference. Data is transmitted on copper cables as electrical pulses. The electrical pulses are susceptible to interference from two sources:
Electromagnetic interference (EMI) or radio frequency interference (RFI)– EMI and RFI signals can distort and corrupt the data signals being carried by copper media.
Crosstalk– Crosstalk is a disturbance caused by the electric or magnetic fields of a signal on one wire interfering with the signal in an adjacent wire.

12. Refer to the graphic.

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p12

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p12

What type of cabling is shown?

STP
UTP*
coax
fiber

13. Which two devices commonly affect wireless networks? (Choose two.)

Blu-ray players
home theaters
cordless phones*
microwaves*
incandescent light bulbs
external hard drives

Explanation:Radio Frequency Interference (RFI) is the interference that is caused by radio transmitters and other devices that are transmitting in the same frequency.

It defines the end-to-end delivery addressing scheme.
It maintains the path between the source and destination devices during the data transmission.
It manages the access of frames to the network media.*
It provides reliable delivery through link establishment and flow control.
It ensures that application data will be transmitted according to the prioritization.
It packages various Layer 3 PDUs into a frame format that is compatible with the network interface.*

Explanation:The data link layer is divided into two sub layers, namely Logical Link Control (LLC) and Media Access Control (MAC). LLC forms a frame from the network layer PDU into a format that conforms to the requirements of the network interface and media. A network layer PDU might be for IPv4 or IPv6. The MAC sub layer defines the media access processes performed by the hardware. It manages the frame access to the network media according to the physical signaling requirements (copper cable, fiber optic, wireless, etc.)

15. What is the function of the CRC value that is found in the FCS field of a frame?

to verify the integrity of the received frame*
to verify the physical address in the frame
to verify the logical address in the frame
to compute the checksum header for the data field in the frame

logical address
physical address
data
error detection*

They all include the flow control and logical connection fields.
Ethernet frame header fields contain Layer 3 source and destination addresses.
They vary depending on protocols.*
They include information on user applications.

Explanation:All data link layer protocols encapsulate the Layer 3 PDU within the data field of the frame. However, the structure of the frame and the fields that are contained in the header vary according to the protocol. Different data link layer protocols may use different fields, like priority/quality of service, logical connection control, physical link control, flow control, and congestion control.

18. A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

mesh
partial mesh*
hub and spoke
point-to-point

Explanation:Partial mesh topologies provide high availability by interconnecting multiple remote sites, but do not require a connection between all remote sites. A mesh topology requires point-to-point links with every system being connected to every other system. A point-to-point topology is where each device is connected to one other device. A hub and spoke uses a central device in a star topology that connects to other point-to-point devices.

auto-MDIX
CEF
Frame Check Sequence*
minimum frame size*
source MAC address

deterministic
half-duplex
full-duplex*
controlled access

Explanation:Half-duplex communication occurs when both devices can both transmit and receive on the medium but cannot do so simultaneously. Full-duplex communication occurs when both devices can transmit and receive on the medium at the same time and therefore does not require media arbitration. Half-duplex communication is typically contention-based, whereas controlled (deterministic) access is applied in technologies where devices take turns to access the medium.

21. Which statement describes an extended star topology?

End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.*
End devices are connected together by a bus and each bus connects to a central intermediate device.
Each end system is connected to its respective neighbor via an intermediate device.
All end and intermediate devices are connected in a chain to each other.

Explanation:In an extended star topology, central intermediate devices interconnect other star topologies.

22. What is a characteristic of the LLC sublayer?

It provides the logical addressing required that identifies the device.
It provides delimitation of data according to the physical signaling requirements of the medium.
It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.*
It defines software processes that provide services to the physical layer.

23. What are three ways that media access control is used in networking? (Choose three.)

Ethernet utilizes CSMA/CD.*
Media access control provides placement of data frames onto the media.*
Contention-based access is also known as deterministic.
802.11 utilizes CSMA/CD.
Data link layer protocols define the rules for access to different media.*
Networks with controlled access have reduced performance due to data collisions.

An IP address is added.
The logical address is added.
The physical address is added.*
The process port number is added.

Explanation:The Ethernet frame includes the source and destination physical address. The trailer includes a CRC value in the Frame Check Sequence field to allow the receiving device to determine if the frame has been changed (has errors) during the transmission.

25. What three items are contained in an Ethernet header and trailer? (Choose three.)

source IP address
source MAC address*
destination IP address
destination MAC address*
error-checking information*

Explanation:Layer 2 headers contain the following:
Frame start and stop indicator flags at the beginning and end of a frame
Addressing – for Ethernet networks this part of the header contains source and destination MAC addresses
Type field to indicate what Layer 3 protocol is being used
Error detection to determine if the frame arrived without error

26. What type of communication rule would best describe CSMA/CD?

access method*
flow control
message encapsulation
message encoding

Explanation:Carrier sense multiple access collision detection (CSMA/CD) is the access method used with Ethernet. The access method rule of communication dictates how a network device is able to place a signal on the carrier. CSMA/CD dictates those rules on an Ethernet network and CSMA/CA dictates those rules on an 802.11 wireless LAN.

header*
type field
MTU size
Data*
Tráiler*
CRC value

Explanation:The data link protocol is responsible for NIC-to-NIC communications within the same network. Although there are many different data link layer protocols that describe data link layer frames, each frame type has three basic parts:
Header
Data
Trailer

28. Which statement is true about the CSMA/CD access method that is used in Ethernet?

When a device hears a carrier signal and transmits, a collision cannot occur.
A jamming signal causes only devices that caused the collision to execute a backoff algorithm.
All network devices must listen before transmitting.*
Devices involved in a collision get priority to transmit after the backoff period.

29. What is the auto-MDIX feature on a switch?

the automatic configuration of an interface for 10/100/1000 Mb/s operation
the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection*
the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable
the ability to turn a switch interface on or off accordingly if an active connection is detected

Explanation:The auto-MDIX enables a switch to use a crossover or a straight-through Ethernet cable to connect to a device regardless of the device on the other end of the connection.

30. Refer to the exhibit.

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p30

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p30

What is the destination MAC address of the Ethernet frame as it leaves the web server if the final destination is PC1?

00-60-2F-3A-07-AA
00-60-2F-3A-07-BB
00-60-2F-3A-07-CC*
00-60-2F-3A-07-DD

Explanation:The destination MAC address is used for local delivery of Ethernet frames. The MAC (Layer 2) address changes at each network segment along the path. As the frame leaves the web server, it will be delivered by using the MAC address of the default gateway.

31. A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

port-based buffering
level 1 cache buffering
shared memory buffering*
fixed configuration buffering

32. What are two examples of the cut-through switching method? (Choose two.)

store-and-forward switching
fast-forward switching*
CRC switching
fragment-free switching*
QOS switching

33. Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

cut-through switching
store-and-forward switching*
fragment-free switching
fast-forward switching

Explanation:Fast-forward and fragment-free switching are variations of cut-through switching, which begins to forward the frame before the entire frame is received.

34. What is the purpose of the FCS field in a frame?

to obtain the MAC address of the sending node
to verify the logical address of the sending node
to compute the CRC header for the data field
to determine if errors occurred in the transmission and reception*

Explanation:The FCS field in a frame is used to detect any errors in the transmission and receipt of a frame. This is done by comparing the CRC value within the frame against a computed CRC value of the frame. If the two values do not match, then the frame is discarded.

35. Which switching method has the lowest level of latency?

cut-through
store-and-forward
fragment-free
fast-forward*

Explanation:Fast-forward switching begins to forward a frame after reading the destination MAC address, resulting in the lowest latency. Fragment-free reads the first 64 bytes before forwarding. Store-and-forward has the highest latency because it reads the entire frame before beginning to forward it. Both fragment-free and fast-forward are types of cut-through switching.

36. A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection? (Choose three.)

The link between the switches will work at the fastest speed that is supported by both switches.*
The link between switches will work as full-duplex.*
If both switches support different speeds, they will each work at their own fastest speed.
The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.*
The connection will not be possible unless the administrator changes the cable to a crossover cable.
The duplex capability has to be manually configured because it cannot be negotiated.

Explanation:Modern switches can negotiate to work in full-duplex mode if both switches are capable. They will negotiate to work using the fastest possible speed and the auto-MDIX feature is enabled by default, so a cable change is not needed.

37. Which advantage does the store-and-forward switching method have compared with the cut-through switching method?

collision detecting
frame error checking*
faster frame forwarding
frame forwarding using IPv4 Layer 3 and 4 information

Explanation:A switch using the store-and-forward switching method performs an error check on an incoming frame by comparing the FCS value against its own FCS calculations after the entire frame is received. In comparison, a switch using the cut-through switching method makes quick forwarding decisions and starts the forwarding process without waiting for the entire frame to be received. Thus a switch using cut-through switching may send invalid frames to the network. The performance of store-and-forward switching is slower compared to cut-through switching performance. Collision detection is monitored by the sending device. Store-and-forward switching does not use IPv4 Layer 3 and 4 information for its forwarding decisions.

38. When the store-and-forward method of switching is in use, what part of the Ethernet frame is used to perform an error check?

CRC in the tráiler*
source MAC address in the header
destination MAC address in the header
protocol type in the header

39. Which switching method uses the CRC value in a frame?

cut-through
fast-forward
fragment-free
store-and-forward*

Explanation:When the store-and-forward switching method is used, the switch receives the complete frame before forwarding it on to the destination. The cyclic redundancy check (CRC) part of the trailer is used to determine if the frame has been modified during transit.​​ In contrast, a cut-through switch forwards the frame once the destination Layer 2 address is read. Two types of cut-through switching methods are fast-forward and fragment-free.

40. What are two actions performed by a Cisco switch? (Choose two.)

building a routing table that is based on the first IP address in the frame header
using the source MAC addresses of frames to build and maintain a MAC address table*
forwarding frames with unknown destination IP addresses to the default gateway
utilizing the MAC address table to forward frames via the destination MAC address*
examining the destination MAC address to add new entries to the MAC address table

Explanation:Important actions that a switch performs are as follows:
When a frame comes in, the switch examines the Layer 2 source address to build and maintain the Layer 2 MAC address table.
It examines the Layer 2 destination address to determine how to forward the frame. When the destination address is in the MAC address table, then the frame is sent out a particular port. When the address is unknown, the frame is sent to all ports that have devices connected to that network.

Logical link control is implemented in software.*
Logical link control is specified in the IEEE 802.3 standard.
The LLC sublayer adds a header and a trailer to the data.
The data link layer uses LLC to communicate with the upper layers of the protocol suite.*
The LLC sublayer is responsible for the placement and retrieval of frames on and off the media.

Explanation:Logical link control is implemented in software and enables the data link layer to communicate with the upper layers of the protocol suite. Logical link control is specified in the IEEE 802.2 standard. IEEE 802.3 is a suite of standards that define the different Ethernet types. The MAC (Media Access Control) sublayer is responsible for the placement and retrieval of frames on and off the media. The MAC sublayer is also responsible for adding a header and a trailer to the network layer protocol data unit (PDU).

42. What is the auto-MDIX feature?

It enables a device to automatically configure an interface to use a straight-through or a crossover cable.*
It enables a device to automatically configure the duplex settings of a segment.
It enables a device to automatically configure the speed of its interface.
It enables a switch to dynamically select the forwarding method.

43. What is one advantage of using the cut-through switching method instead of the store-and-forward switching method?

has a positive impact on bandwidth by dropping most of the invalid frames
makes a fast forwarding decision based on the source MAC address of the frame
has a lower latency appropriate for high-performance computing applications​*
provides the flexibility to support any mix of Ethernet speeds

Explanation:Cut-through switching provides lower latency switching for high-performance computing (HPC) applications. Cut-through switching allows more invalid frames to cross the network than store-and-forward switching. The cut-through switching method can make a forwarding decision as soon as it looks up the destination MAC address of the frame.

44. Which is a multicast MAC address?

FF-FF-FF-FF-FF-FF
5C-26-0A-4B-19-3E
01-00-5E-00-00-03*
00-26-0F-4B-00-3E

45. Refer to the exhibit.

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p45

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p45

What is wrong with the displayed termination?

The woven copper braid should not have been removed.
The wrong type of connector is being used.
The untwisted length of each wire is too long.*
The wires are too thick for the connector that is used.

Explanation:When a cable to an RJ-45 connector is terminated, it is important to ensure that the untwisted wires are not too long and that the flexible plastic sheath surrounding the wires is crimped down and not the bare wires. None of the colored wires should be visible from the bottom of the jack.

46. Refer to the exhibit.

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p46

CCNA 1 v7.0 Modules 4 – 7 Exam Answers p46

1 – rollover, 2 – crossover, 3 – straight-through
1 – rollover, 2 – straight-through, 3 – crossover*
1 – crossover, 2 – straight-through, 3 – rollover
1 – crossover, 2 – rollover, 3 – straight-through

Explanation:A straight-through cable is commonly used to interconnect a host to a switch and a switch to a router. A crossover cable is used to interconnect similar devices together like switch to a switch, a host to a host, or a router to a router. If a switch has the MDIX capability, a crossover could be used to connect the switch to the router; however, that option is not available. A rollover cable is used to connect to a router or switch console port.

47. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which port does Switch0 use to send frames to the host with the IPv4 address 10.1.1.5?

Fa0/1
Fa0/5
Fa0/9
Fa0/11*

Explanation:Issuing the commandipconfig /allfrom the PC0 command prompt displays the IPv4 address and MAC address. When the IPv4 address 10.1.1.5 is pinged from PC0, the switch stores the source MAC address (from PC0) along with the port to which PC0 is connected. When the destination reply is received, the switch takes the destination MAC address and compares to MAC addresses stored in the MAC address table. Issuing theshow mac-address-tableon the PC0 Terminal application displays two dynamic MAC address entries. The MAC address and port entry that does not belong to PC0 must be the MAC address and port of the destination with the IPv4 address 10.1.1.5.

48. What does the term “attenuation” mean in data communication?

loss of signal strength as distance increases*
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

Explanation:Data is transmitted on copper cables as electrical pulses. A detector in the network interface of a destination device must receive a signal that can be successfully decoded to match the signal sent. However, the farther the signal travels, the more it deteriorates. This is referred to as signal attenuation.

49. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

greater distances per cable run*
lower installation cost
limited susceptibility to EMI/RFI*
durable connections
greater bandwidth potential*
easily terminated

Explanation:Optical fiber cable transmits data over longer distances and at higher bandwidths than any other networking media. Unlike copper wires, fiber-optic cable can transmit signals with less attenuation and is completely immune to EMI and RFI.

50. What OSI physical layer term describes the process by which one wave modifies another wave?

Modulation*
IEEE
EIA/TIA
air

51. What OSI physical layer term describes the capacity at which a medium can carry data?

Bandwidth*
IEEE
EIA/TIA
air

52. What OSI physical layer term describes the capacity at which a medium can carry data?

Bandwidth*
throughput
latency
goodput

53. What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time?

Throughput*
bandwidth
latency
goodput

54. What OSI physical layer term describes the amount of time, including delays, for data to travel from one point to another?

Latency*
bandwidth
throughput
goodput

55. What OSI physical layer term describes the amount of time, including delays, for data to travel from one point to another?

Latency*
fiber-optic cable
air
copper cable

56. What OSI physical layer term describes the measure of usable data transferred over a given period of time?

Goodput*
fiber-optic cable
air
copper cable

57. What OSI physical layer term describes the physical medium which uses electrical pulses?

copper cable*
fiber-optic cable
air
goodput

58. What OSI physical layer term describes the physical medium that uses the propagation of light?

fiber-optic cable*
goodput
latency
throughput

59. What OSI physical layer term describes the physical medium for microwave transmissions?

Air*
goodput
latency
throughput

Implements a trailer to detect transmission errors.*
Controls the NIC responsible for sending and receiving data on the physical medium.*
Places information in the frame that identifies which network layer protocol is being used for the frame.
Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.

Enables IPv4 and IPv6 to utilize the same network interface and media.*
Places information in the frame that identifies which network layer protocol is being used for the frame.*
Integrates various physical technologies.
Implements a process to delimit fields within a Layer 2 frame.
Controls the NIC responsible for sending and receiving data on the physical medium.

Provides a mechanism to allow multiple devices to communicate over a shared medium.*
Controls the NIC responsible for sending and receiving data on the physical medium.*
Places information in the frame that identifies which network layer protocol is being used for the frame.
Adds Layer 2 control information to network protocol data.
Communicates between the networking software at the upper layers and the device hardware at the lower layers.

Controls the NIC responsible for sending and receiving data on the physical medium.*
Integrates various physical technologies.*
Communicates between the networking software at the upper layers and the device hardware at the lower layers.
Adds Layer 2 control information to network protocol data.
Places information in the frame that identifies which network layer protocol is being used for the frame.

Adds Layer 2 control information to network protocol data.*
Places information in the frame that identifies which network layer protocol is being used for the frame.*
Performs data encapsulation.
Controls the NIC responsible for sending and receiving data on the physical medium.
Integrates various physical technologies.

Provides synchronization between source and target nodes.*
Integrates various physical technologies.*
Communicates between the networking software at the upper layers and the device hardware at the lower layers.
Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.

Adds Layer 2 control information to network protocol data.*
Enables IPv4 and IPv6 to utilize the same network interface and media.*
Provides data link layer addressing.
Implements a trailer to detect transmission errors.
Provides synchronization between source and target nodes.

Implements a trailer to detect transmission errors.*
Provides synchronization between source and target nodes.*
Places information in the frame that identifies which network layer protocol is being used for the frame.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Adds Layer 2 control information to network protocol data.

Enables IPv4 and IPv6 to utilize the same network interface and media.*
Adds Layer 2 control information to network protocol data.*
Integrates various physical technologies.
Implements a trailer to detect transmission errors.
Provides synchronization between source and target nodes.

Provides a mechanism to allow multiple devices to communicate over a shared medium.*
Controls the NIC responsible for sending and receiving data on the physical medium.*
Places information in the frame that identifies which network layer protocol is being used for the frame.
Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.

70. What action will occur if a switch receives a frame and does have the source MAC address in the MAC table?

The switch refreshes the timer on that entry.*
The switch shares the MAC address table entry with any connected switches.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC address is not local.

71. What action will occur if a switch receives a frame with the destination MAC address FF:FF:FF:FF:FF:FF?

The switch forwards it out all ports except the ingress port.*
The switch shares the MAC address table entry with any connected switches.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC address is not local.

72. What action will occur if a host receives a frame with a destination MAC address it does not recognize?

The host will discard the frame.*
The host sends the frame to the switch to update the MAC address table.
The host forwards the frame to the router.
The host forwards the frame to all other hosts.

73. What action will occur if a switch receives a frame with the destination MAC address 01:00:5E:00:00:D9?

The switch forwards it out all ports except the ingress port.*
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC address is not local.
The switch shares the MAC address table entry with any connected switches.

74. What action will occur if a host receives a frame with a destination MAC address of FF:FF:FF:FF:FF:FF?

The host will process the frame.*
The host forwards the frame to the router.
The host sends the frame to the switch to update the MAC address table.
The host forwards the frame to all other hosts.

75. What action will occur if a switch receives a frame and does have the source MAC address in the MAC table?

The switch refreshes the timer on that entry.*
The switch adds it to its MAC address table associated with the port number.
The switch forwards the frame to the associated port.
The switch sends the frame to a connected router because the destination MAC address is not local.

76. What action will occur if a host receives a frame with a destination MAC address of FF:FF:FF:FF:FF:FF?

The host will process the frame.*
The host returns the frame to the switch.
The host replies to the switch with its own IP address.
The host forwards the frame to all other hosts.

77. What action will occur if a switch receives a frame and does have the source MAC address in the MAC table?

The switch refreshes the timer on that entry.*
The switch shares the MAC address table entry with any connected switches.
The switch does not forward the frame.
The switch adds it to its MAC address table associated with the port number.

78. What action will occur if a host receives a frame with a destination MAC address it does not recognize?

The host will discard the frame.*
The host replies to the switch with its own IP address.
The host forwards the frame to all other hosts.
The host returns the frame to the switch.

79. What action will occur if a switch receives a frame with the destination MAC address FF:FF:FF:FF:FF:FF?

The switch forwards it out all ports except the ingress port.*
The switch refreshes the timer on that entry.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC address is not local.

Local Area Networks

Judy Wynekoop, in Encyclopedia of Information Systems, 2003

III.A.2. Physical Topologies

There are three basic physical topologies: bus, ring, and star. That is, the cables in a network approximate the shape of a bus, ring, or star. In a bus physical topology, all devices are connected in a line along a single channel. Signals propagate along the entire length of the bus. Each end of the bus must be terminated to prevent signal loss and echoes. A drawback to a bus network is that a cable break or loose connection in the network will cause the network to stop working.

In a ring each device physically removes a frame from the media and regenerates it. Therefore, a physical ring has the same shortcoming as a physical bus topology: a cable break or loose connection in the network could cause the whole network to stop working.

In a star, each node communicates directly with only the central device in a point-to-point connection. Therefore, any problems in a particular computer or the media connecting it to the central device do not affect the rest of the network. Various types of hardware, such as multiport repeaters or switches, can serve as the central device, depending on the network architecture. A star is easier to troubleshoot than is a physical ring or bus. If a computer on a star has trouble receiving or sending data, the problem must be between that computer and its connection to the device at the center of the star. Problems on a ring or bus cannot be isolated as easily. However, in the star, since all communication passes through the central device, if it is not working, there is no network.

Networks with both broadcast and sequential logical topologies (i.e., logical buses and rings) are usually implemented today as physical stars. The circuitry of the central device replicates the electrical activity of a logical bus or ring—signals are broadcast or passed sequentially within the central device.

There are also variations on the basic physical topologies. For example, a mesh topology is similar to a star with point-to-point connections between devices that are not in the center of the star. In a full mesh network, each pair of computers is directly connected.

View chapterPurchase book

Read full chapter

URL:https://www.sciencedirect.com/science/article/pii/B0122272404001064