In the following section we will look useful CCNA Dumps Part3 that would help you a lot.
1. Which of the following is not a benefit of reference models such as the OSI model?
A. It allows changes on one layer to affect operations on all other layers as well.
B. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
C. It allows multiple-vendor development through standardization of network components.
D. It allows various types of network hardware and software to communicate.
2. Which of the following devices do not operate at all levels of the OSI model?
A. Network management stations (NMSs)
B. Routers
C. Web and application servers
D. Network hosts
3. When an HTTP document must be retrieved from a location other than the local machine, what layer of the OSI model must be accessed first?
A. Presentations
B. Transport
C. Application
D. Network
4. Which layer of the OSI model offers three different modes of communication: simplex, half duplex, and full duplex?
A. Presentation
B. Transport
C. Application
D. Session
5. Which fields are contained within an IEEE Ethernet frame? (Choose two.)
A. Source and destination MAC address
B. Source and destination network address
C. Source and destination MAC address and source and destination network address
D. FCS field
6. Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet? (Choose two.)
A. Half-duplex Ethernet operates in a shared collision domain.
B. Half-duplex Ethernet operates in a private collision domain.
C. Half-duplex Ethernet has higher effective throughput.
D. Half-duplex Ethernet has lower effective throughput.
E. Half-duplex Ethernet operates in a private broadcast domain.
7. You want to implement a network medium that is not susceptible to EMI. Which type of cabling should you use?
A. Thicknet coax
B. Thinnet coax
C. Category 5 UTP cable
D. Fiber-optic cable
8. Which of the following types of connections can use full duplex? (Choose three.)
A. Hub to hub
B. Switch to switch
C. Host to host
D. Switch to hub
E. Switch to host
9. What type of RJ45 UTP cable is used between switches?
A. Straight-through
B. Crossover cable
C. Crossover with a CSU/DSU
D. Crossover with a router in between the two switches
10. How does a host on an Ethernet LAN know when to transmit after a collision has occurred? (Choose two.)
A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
C. You can improve the CSMA/CD network by adding more hubs.
D. After a collision, the station that detected the collision has first priority to resend the lost data.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
11. What type of RJ45 UTP cable do you use to connect a PC’s COM port to a router or switch console port?
A. Straight-through
B. Crossover cable
C. Crossover with a CSU/DSU
D. Rolled
12. You have the following binary number: 10110111. What are the decimal and hexadecimal equivalents?
A. 69/0x2102
B. 183/B7
C. 173/A6
D. 83/0xC5
13. Which of the following contention mechanisms is used by Ethernet?
A. Token passing
B. CSMA/CD
C. CSMA/CA
D. Host polling
14. In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?
A. All hosts have equal priority.
B. The two hosts that caused the collision will have equal priority.
C. The host that sent the jam signal after the collision.
D. The host with the highest MAC address.
15. Which of the following is correct?
A. Full-duplex Ethernet uses one pair of wires.
B. Full-duplex Ethernet uses two pairs of wires.
C. Half-duplex Ethernet uses two pairs of wires.
D. Full-duplex Ethernet uses three pairs of wires.
16. Which of the following statements is false with respect to full duplex?
A. There are no collisions in full-duplex mode.
B. A dedicated switch port is required for each full-duplex node.
C. There are few collisions in full-duplex mode.
D. The host network card and the switch port must be capable of operating in full-duplex mode.
17. Which statement is correct with regard to a MAC address?
A. A MAC, or logical, address is a 48-bit (6-byte) address written in a hexadecimal format.
B. A MAC, or hardware, address is a 64-bit (6-byte) address written in a hexadecimal format.
C. A MAC, or hardware, address is a 48-bit (6-byte) address written in a binary format.
D. A MAC, or hardware, address is a 48-bit (6-byte) address written in a hexadecimal format.
18. Which part of a MAC address is called the organizationally unique identifier (OUI)?
A. The first 24 bits, or 3 bytes
B. The first 12 bits, or 3 bytes
C. The first 24 bits, or 6 bytes
D. The first 32 bits, or 3 bytes
19. Which layer of the OSI model is responsible for combining bits into bytes and bytes into frames?
A. Presentation
B. Data Link
C. Application
D. Transport
20. What is the specific term for the unwanted signal interference from adjacent pairs in the cable?
A. EMI
B. RFI
C. Crosstalk
D. Attenuation
21. Which of the following is part of the IEEE 802.3u standard?
A. 100Base2
B. 10Base5
C. 100Base-TX
D. 1000Base-T
22. 10GBase-Long Wavelength is known as which IEEE standard?
A. 802.3F
B. 802.3z
C. 802.3ab
D. 802.3ae
23. 1000Base-T is which IEEE standard?
A. 802.3F
B. 802.3z
C. 802.3ab
D. 802.3ae
24. When making a HyperTerminal connection, what must the bit rate be set to?
A. 2400bps
B. 1200bps
C. 9600bps
D. 6400bps
25. What must happen if a DHCP IP conflict occurs?
A. Proxy ARP will fix the issue.
B. The client uses a gratuitous ARP to fix the issue.
C. The administrator must fix the conflict by hand at the DHCP server.
D. The dhcp server will reassign new IP addresses to both computers.
26. Which of the following allows a router to respond to an ARP request that is intended for a remote host?
A. Gateway DP
B. Reverse ARP (RARP)
C. Proxy ARP
D. Inverse ARP (IARP)
E. Address Resolution Protocol (ARP)
27. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?
A. SMTP
B. SNMP
C. DHCP
D. ARP
28. What protocol is used to find the hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
E. BootP
29. Which of the following are layers in the TCP/IP model? (Choose three.)
A. Application
B. Session
C. Transport
D. Internet
E. Data Link
F. Physical
30. Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E
31. Which of the following describe the DHCP Discover message? (Choose two.)
A. It uses FF:FF:FF:FF:FF:FF as a layer-2 broadcast.
B. It uses UDP as the Transport layer protocol.
C. It uses TCP as the Transport layer protocol.
D. It does not use a layer-2 destination address.
32. Which layer-4 protocol is used for a Telnet connection?
A. IP
B. TCP
C. TCP/IP
D. UDP
E. ICMP
33. How does a DHCP client ensure that no other computer has its assigned IP address?
A. Acknowledge receipt of a TCP segment.
B. Ping to its own address to see if a response is detected.
C. Broadcast a Proxy ARP
D. Broadcast a gratuitous ARP
E. Telnet to its own IP address
34. Which of the following services use TCP? (Choose three.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP
35. Which of the following services use UDP? (Choose three.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP
36. Which of the following are TCP/IP protocols used at the Application layer of the OSI model? (Choose three.)
A. IP
B. TCP
C. Telnet
D. FTP
E. TFTP
37. If you use either Telnet or FTP, what layer are you using to generate the data?
A. Application
B. Presentation
C. Session
D. Transport
38. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
39. Which two of the following are private IP addresses?
A. 12.0.0.1
B. 168.172.19.39
C. 172.20.14.36
D. 172.33.194.30
E. 192.168.24.43
40. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
41. Which statements are true regarding ICMP packets? (Choose two).
A. ICMP guarantees datagram delivery.
B. ICMP can provide hosts with information about network problems.
C. ICMP is encapsulated within IP datagrams.
D. ICMP is encapsulated within UDP datagrams.
42. What is the address range of a Class B network address in binary?
A. 01xxxxxx
B. 0xxxxxxx
C. 10xxxxxx
D. 110xxxxx
43. Which of the following protocols uses both TCP and UDP?
A. FTP
B. SMTP
C. Telnet
D. DNS
44. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
E. 31
F. 62
45. You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?
A. 2
B. 3
C. 4
D. 5
E. 6
F. 7
47. What is the subnetwork address for a host with the IP address 200.10.5.68/28?
A. 200.10.5.56
B. 200.10.5.32
C. 200.10.5.64
D. 200.10.5.0
48. The network address of 172.16.0.0/19 provides how many subnets and hosts?
A. 7 subnets, 30 hosts each
B. 7 subnets, 2,046 hosts each
C. 7 subnets, 8,190 hosts each
D. 8 subnets, 30 hosts each
E. 8 subnets, 2,046 hosts each
F. 8 subnets, 8,190 hosts each
49. Which two statements describe the IP address 10.16.3.65/23? (Choose two.)
A. The subnet address is 10.16.3.0 255.255.254.0.
B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
E. The network is not subnetted.
50. If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host belongs to?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
E. 172.16.45.16
Now check your score
1. A. Reference models prevent, rather than allow, changes on one layer to affect operations on other layers as well, so the model doesn’t hamper development.
2. B. Routers operate no higher than layer 3 of the OSI model.
3. C. When an HTTP document must be retrieved from a location other than the local machine, the Application layer must be accessed first.
4. D. The Session layer of the OSI model offers three different modes of communication: simplex, half duplex, and full duplex.
5. A, D. An Ethernet frame has source and destination MAC addresses, an Ether-Type field to identify the Network layer protocol, the data, and the FCS field that holds the answer to the CRC.
6. A, D. Half-duplex Ethernet works in a shared medium or collision domain. Half duplex provides a lower effective throughput than full duplex.
7. D. Fiber-optic cable provides a more secure, long-distance cable that is not susceptible to EMI interference at high speeds.
8. B, C, E. Hubs cannot run full-duplex Ethernet. Full duplex must be used on a point-to-point connection between two devices capable of running full duplex. Switches and hosts can run full duplex between each other, but a hub can never run full duplex.
9. B. To connect two switches together, you would use a RJ45 UTP crossover cable.
10. B, E. Once transmitting stations on an Ethernet segment hear a collision, they send an extended jam signal to ensure that all stations recognize the collision. After the jamming is complete, each sender waits a predetermined amount of time, plus a random time. After both timers expire, they are free to transmit, but they must make sure the media is clear before transmitting and that they all have equal priority.
11. D. To connect to a router or switch console port, you would use an RJ45 UTP rolled cable.
12. B. You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128 + 32 + 16 + 4 + 2 + 1 = 183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By adding up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.
13. B. Ethernet networking uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium.
14. A. After the expiration of the backoff algorithm, all hosts have equal priority.
15. B. Full-duplex Ethernet uses two pairs of wires.
16. C. There are no collisions in full-duplex mode.
17. D. A MAC, or hardware, address is a 48-bit (6-byte) address written in a hexadecimal format.
18. A. The first 24 bits, or 3 bytes, of a MAC address is called the organizationally unique identifier (OUI).
19. B. The Data Link layer of the OSI model is responsible for combining bits into bytes and bytes into frames.
20. C. The term for the unwanted signal interference from adjacent pairs in the cable is crosstalk.
21. C. IEEE 802.3.u is Fast Ethernet at 100Mbps and covers 100Base-TX, 100BaseT4, and 100Base-FX.
22. D. IEEE 802.3ae is the standard for 10Gbase-SR, -LR, -ER, -SW, -LW, and -E.
23. C. IEEE 802.3ab is the standard for 1Gbps on twisted-pair.
24. C. When making a HyperTerminal connection, the bit rate must be set to 9600bps.
25. C. If a DHCP conflict is detected, either by the server sending a ping and getting a response or by a host using a gratuitous ARP (arp’ing for its own IP address and seeing if a host responds), then the server will hold that address and not use it again until it is fixed by an administrator.
26. C. Proxy ARP can help machines on a subnet reach remote subnets without configuring routing or a default gateway.
27. C. Dynamic Host Configuration Protocol (DHCP) is used to provide IP information to hosts on your network. DHCP can provide a lot of information, but the most common is IP address, subnet mask, default gateway, and DNS information.
28. B. Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.
29. A, C, D. This seems like a hard question at first because it doesn’t make sense. The listed answers are from the OSI model and the question asked about the TCP/IP protocol stack (DoD model). However, let’s just look for what is wrong. First, the Session layer is not in the TCP/IP model; neither are the Data Link and Physical layers. This leaves us with the Transport layer (Host-to-Host in the DoD model), Internet layer (Network layer in the OSI), and Application layer (Application/Process in the DoD).
30. C. A Class C network address has only 8 bits for defining hosts: 28 – 2 = 254.
31. A, B. A client that sends out a DHCP Discover message in order to receive an IP address sends out a broadcast at both layer 2 and layer 3. The layer-2 broadcast is all Fs in hex, or FF:FF:FF:FF:FF:FF. The layer-3 broadcast is 255.255.255.255, which means any networks and all hosts. DHCP is connectionless, which means it uses User Datagram Protocol (UDP) at the Transport layer, also called the Host-to-Host layer.
32. B. Although Telnet does use TCP and IP (TCP/IP), the question specifically asks about layer 4, and IP works at layer 3. Telnet uses TCP at layer 4.
33. D. To stop possible address conflicts, a DHCP client will use gratuitous ARP (broadcast an ARP request for its own IP address) to see if another host responds.
34. B, D, E. SMTP, FTP, and HTTP use TCP.
35. A, C, F. DHCP, SNMP, and TFTP use UDP. SMTP, FTP, and HTTP use TCP.
36. C, D, E. Telnet, File Transfer Protocol (FTP), and Trivial FTP (TFTP) are all Application layer protocols. IP is a Network layer protocol. Transmission Control Protocol (TCP) is a Transport layer protocol.
37. C. First, you should know easily that only TCP and UDP work at the Transport layer, so now you have a 50/50 shot. However, since the header has sequencing, acknowledgment, and window numbers, the answer can only be TCP.
38. C. The four layers of the DoD model are Application/Process, Host-to-Host, Internet, and Network Access. The Internet layer is equivalent to the Network layer of the OSI model.
39. C, E. Class A private address range is 10.0.0.0 through 10.255.255.255. Class B private address range is 172.16.0.0 through 172.31.255.255, and Class C private address range is 192.168.0.0 through 192.168.255.255.
40. B. The four layers of the TCP/IP stack (also called the DoD model) are Application/Process, Host-to-Host, Internet, and Network Access. The Host-to-Host layer is equivalent to the Transport layer of the OSI model.
42. C. The range of a Class B network address is 128–191. This makes our binary range 10xxxxxx.
43. D. DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP addres
44. D. A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits would never change.
45. D. A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets, so let’s add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer.
46. C. This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is 16 in the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.
47.C. C. 200.10.5.64
48. F. A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
49. B, D. The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 – 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.
50. D. A /30, regardless of the class of address, has a 252 in the fourth octet. This means we have a block size of 4 and our subnets are 0, 4, 8, 12, 16, etc. Address 14 is obviously in the 12 subnet.
1. Which of the following is not a benefit of reference models such as the OSI model?
A. It allows changes on one layer to affect operations on all other layers as well.
B. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
C. It allows multiple-vendor development through standardization of network components.
D. It allows various types of network hardware and software to communicate.
2. Which of the following devices do not operate at all levels of the OSI model?
A. Network management stations (NMSs)
B. Routers
C. Web and application servers
D. Network hosts
3. When an HTTP document must be retrieved from a location other than the local machine, what layer of the OSI model must be accessed first?
A. Presentations
B. Transport
C. Application
D. Network
4. Which layer of the OSI model offers three different modes of communication: simplex, half duplex, and full duplex?
A. Presentation
B. Transport
C. Application
D. Session
5. Which fields are contained within an IEEE Ethernet frame? (Choose two.)
A. Source and destination MAC address
B. Source and destination network address
C. Source and destination MAC address and source and destination network address
D. FCS field
6. Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet? (Choose two.)
A. Half-duplex Ethernet operates in a shared collision domain.
B. Half-duplex Ethernet operates in a private collision domain.
C. Half-duplex Ethernet has higher effective throughput.
D. Half-duplex Ethernet has lower effective throughput.
E. Half-duplex Ethernet operates in a private broadcast domain.
7. You want to implement a network medium that is not susceptible to EMI. Which type of cabling should you use?
A. Thicknet coax
B. Thinnet coax
C. Category 5 UTP cable
D. Fiber-optic cable
8. Which of the following types of connections can use full duplex? (Choose three.)
A. Hub to hub
B. Switch to switch
C. Host to host
D. Switch to hub
E. Switch to host
9. What type of RJ45 UTP cable is used between switches?
A. Straight-through
B. Crossover cable
C. Crossover with a CSU/DSU
D. Crossover with a router in between the two switches
10. How does a host on an Ethernet LAN know when to transmit after a collision has occurred? (Choose two.)
A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
C. You can improve the CSMA/CD network by adding more hubs.
D. After a collision, the station that detected the collision has first priority to resend the lost data.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
11. What type of RJ45 UTP cable do you use to connect a PC’s COM port to a router or switch console port?
A. Straight-through
B. Crossover cable
C. Crossover with a CSU/DSU
D. Rolled
12. You have the following binary number: 10110111. What are the decimal and hexadecimal equivalents?
A. 69/0x2102
B. 183/B7
C. 173/A6
D. 83/0xC5
13. Which of the following contention mechanisms is used by Ethernet?
A. Token passing
B. CSMA/CD
C. CSMA/CA
D. Host polling
14. In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?
A. All hosts have equal priority.
B. The two hosts that caused the collision will have equal priority.
C. The host that sent the jam signal after the collision.
D. The host with the highest MAC address.
15. Which of the following is correct?
A. Full-duplex Ethernet uses one pair of wires.
B. Full-duplex Ethernet uses two pairs of wires.
C. Half-duplex Ethernet uses two pairs of wires.
D. Full-duplex Ethernet uses three pairs of wires.
16. Which of the following statements is false with respect to full duplex?
A. There are no collisions in full-duplex mode.
B. A dedicated switch port is required for each full-duplex node.
C. There are few collisions in full-duplex mode.
D. The host network card and the switch port must be capable of operating in full-duplex mode.
17. Which statement is correct with regard to a MAC address?
A. A MAC, or logical, address is a 48-bit (6-byte) address written in a hexadecimal format.
B. A MAC, or hardware, address is a 64-bit (6-byte) address written in a hexadecimal format.
C. A MAC, or hardware, address is a 48-bit (6-byte) address written in a binary format.
D. A MAC, or hardware, address is a 48-bit (6-byte) address written in a hexadecimal format.
18. Which part of a MAC address is called the organizationally unique identifier (OUI)?
A. The first 24 bits, or 3 bytes
B. The first 12 bits, or 3 bytes
C. The first 24 bits, or 6 bytes
D. The first 32 bits, or 3 bytes
19. Which layer of the OSI model is responsible for combining bits into bytes and bytes into frames?
A. Presentation
B. Data Link
C. Application
D. Transport
20. What is the specific term for the unwanted signal interference from adjacent pairs in the cable?
A. EMI
B. RFI
C. Crosstalk
D. Attenuation
21. Which of the following is part of the IEEE 802.3u standard?
A. 100Base2
B. 10Base5
C. 100Base-TX
D. 1000Base-T
22. 10GBase-Long Wavelength is known as which IEEE standard?
A. 802.3F
B. 802.3z
C. 802.3ab
D. 802.3ae
23. 1000Base-T is which IEEE standard?
A. 802.3F
B. 802.3z
C. 802.3ab
D. 802.3ae
24. When making a HyperTerminal connection, what must the bit rate be set to?
A. 2400bps
B. 1200bps
C. 9600bps
D. 6400bps
25. What must happen if a DHCP IP conflict occurs?
A. Proxy ARP will fix the issue.
B. The client uses a gratuitous ARP to fix the issue.
C. The administrator must fix the conflict by hand at the DHCP server.
D. The dhcp server will reassign new IP addresses to both computers.
26. Which of the following allows a router to respond to an ARP request that is intended for a remote host?
A. Gateway DP
B. Reverse ARP (RARP)
C. Proxy ARP
D. Inverse ARP (IARP)
E. Address Resolution Protocol (ARP)
27. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?
A. SMTP
B. SNMP
C. DHCP
D. ARP
28. What protocol is used to find the hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
E. BootP
29. Which of the following are layers in the TCP/IP model? (Choose three.)
A. Application
B. Session
C. Transport
D. Internet
E. Data Link
F. Physical
30. Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E
31. Which of the following describe the DHCP Discover message? (Choose two.)
A. It uses FF:FF:FF:FF:FF:FF as a layer-2 broadcast.
B. It uses UDP as the Transport layer protocol.
C. It uses TCP as the Transport layer protocol.
D. It does not use a layer-2 destination address.
32. Which layer-4 protocol is used for a Telnet connection?
A. IP
B. TCP
C. TCP/IP
D. UDP
E. ICMP
33. How does a DHCP client ensure that no other computer has its assigned IP address?
A. Acknowledge receipt of a TCP segment.
B. Ping to its own address to see if a response is detected.
C. Broadcast a Proxy ARP
D. Broadcast a gratuitous ARP
E. Telnet to its own IP address
34. Which of the following services use TCP? (Choose three.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP
35. Which of the following services use UDP? (Choose three.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP
36. Which of the following are TCP/IP protocols used at the Application layer of the OSI model? (Choose three.)
A. IP
B. TCP
C. Telnet
D. FTP
E. TFTP
37. If you use either Telnet or FTP, what layer are you using to generate the data?
A. Application
B. Presentation
C. Session
D. Transport
38. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
39. Which two of the following are private IP addresses?
A. 12.0.0.1
B. 168.172.19.39
C. 172.20.14.36
D. 172.33.194.30
E. 192.168.24.43
40. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
41. Which statements are true regarding ICMP packets? (Choose two).
A. ICMP guarantees datagram delivery.
B. ICMP can provide hosts with information about network problems.
C. ICMP is encapsulated within IP datagrams.
D. ICMP is encapsulated within UDP datagrams.
42. What is the address range of a Class B network address in binary?
A. 01xxxxxx
B. 0xxxxxxx
C. 10xxxxxx
D. 110xxxxx
43. Which of the following protocols uses both TCP and UDP?
A. FTP
B. SMTP
C. Telnet
D. DNS
44. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
E. 31
F. 62
45. You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?
A. 2
B. 3
C. 4
D. 5
E. 6
F. 7
47. What is the subnetwork address for a host with the IP address 200.10.5.68/28?
A. 200.10.5.56
B. 200.10.5.32
C. 200.10.5.64
D. 200.10.5.0
48. The network address of 172.16.0.0/19 provides how many subnets and hosts?
A. 7 subnets, 30 hosts each
B. 7 subnets, 2,046 hosts each
C. 7 subnets, 8,190 hosts each
D. 8 subnets, 30 hosts each
E. 8 subnets, 2,046 hosts each
F. 8 subnets, 8,190 hosts each
49. Which two statements describe the IP address 10.16.3.65/23? (Choose two.)
A. The subnet address is 10.16.3.0 255.255.254.0.
B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
E. The network is not subnetted.
50. If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host belongs to?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
E. 172.16.45.16
Now check your score
1. A. Reference models prevent, rather than allow, changes on one layer to affect operations on other layers as well, so the model doesn’t hamper development.
2. B. Routers operate no higher than layer 3 of the OSI model.
3. C. When an HTTP document must be retrieved from a location other than the local machine, the Application layer must be accessed first.
4. D. The Session layer of the OSI model offers three different modes of communication: simplex, half duplex, and full duplex.
5. A, D. An Ethernet frame has source and destination MAC addresses, an Ether-Type field to identify the Network layer protocol, the data, and the FCS field that holds the answer to the CRC.
6. A, D. Half-duplex Ethernet works in a shared medium or collision domain. Half duplex provides a lower effective throughput than full duplex.
7. D. Fiber-optic cable provides a more secure, long-distance cable that is not susceptible to EMI interference at high speeds.
8. B, C, E. Hubs cannot run full-duplex Ethernet. Full duplex must be used on a point-to-point connection between two devices capable of running full duplex. Switches and hosts can run full duplex between each other, but a hub can never run full duplex.
9. B. To connect two switches together, you would use a RJ45 UTP crossover cable.
10. B, E. Once transmitting stations on an Ethernet segment hear a collision, they send an extended jam signal to ensure that all stations recognize the collision. After the jamming is complete, each sender waits a predetermined amount of time, plus a random time. After both timers expire, they are free to transmit, but they must make sure the media is clear before transmitting and that they all have equal priority.
11. D. To connect to a router or switch console port, you would use an RJ45 UTP rolled cable.
12. B. You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128 + 32 + 16 + 4 + 2 + 1 = 183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By adding up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.
13. B. Ethernet networking uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium.
14. A. After the expiration of the backoff algorithm, all hosts have equal priority.
15. B. Full-duplex Ethernet uses two pairs of wires.
16. C. There are no collisions in full-duplex mode.
17. D. A MAC, or hardware, address is a 48-bit (6-byte) address written in a hexadecimal format.
18. A. The first 24 bits, or 3 bytes, of a MAC address is called the organizationally unique identifier (OUI).
19. B. The Data Link layer of the OSI model is responsible for combining bits into bytes and bytes into frames.
20. C. The term for the unwanted signal interference from adjacent pairs in the cable is crosstalk.
21. C. IEEE 802.3.u is Fast Ethernet at 100Mbps and covers 100Base-TX, 100BaseT4, and 100Base-FX.
22. D. IEEE 802.3ae is the standard for 10Gbase-SR, -LR, -ER, -SW, -LW, and -E.
23. C. IEEE 802.3ab is the standard for 1Gbps on twisted-pair.
24. C. When making a HyperTerminal connection, the bit rate must be set to 9600bps.
25. C. If a DHCP conflict is detected, either by the server sending a ping and getting a response or by a host using a gratuitous ARP (arp’ing for its own IP address and seeing if a host responds), then the server will hold that address and not use it again until it is fixed by an administrator.
26. C. Proxy ARP can help machines on a subnet reach remote subnets without configuring routing or a default gateway.
27. C. Dynamic Host Configuration Protocol (DHCP) is used to provide IP information to hosts on your network. DHCP can provide a lot of information, but the most common is IP address, subnet mask, default gateway, and DNS information.
28. B. Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.
29. A, C, D. This seems like a hard question at first because it doesn’t make sense. The listed answers are from the OSI model and the question asked about the TCP/IP protocol stack (DoD model). However, let’s just look for what is wrong. First, the Session layer is not in the TCP/IP model; neither are the Data Link and Physical layers. This leaves us with the Transport layer (Host-to-Host in the DoD model), Internet layer (Network layer in the OSI), and Application layer (Application/Process in the DoD).
30. C. A Class C network address has only 8 bits for defining hosts: 28 – 2 = 254.
31. A, B. A client that sends out a DHCP Discover message in order to receive an IP address sends out a broadcast at both layer 2 and layer 3. The layer-2 broadcast is all Fs in hex, or FF:FF:FF:FF:FF:FF. The layer-3 broadcast is 255.255.255.255, which means any networks and all hosts. DHCP is connectionless, which means it uses User Datagram Protocol (UDP) at the Transport layer, also called the Host-to-Host layer.
32. B. Although Telnet does use TCP and IP (TCP/IP), the question specifically asks about layer 4, and IP works at layer 3. Telnet uses TCP at layer 4.
33. D. To stop possible address conflicts, a DHCP client will use gratuitous ARP (broadcast an ARP request for its own IP address) to see if another host responds.
34. B, D, E. SMTP, FTP, and HTTP use TCP.
35. A, C, F. DHCP, SNMP, and TFTP use UDP. SMTP, FTP, and HTTP use TCP.
36. C, D, E. Telnet, File Transfer Protocol (FTP), and Trivial FTP (TFTP) are all Application layer protocols. IP is a Network layer protocol. Transmission Control Protocol (TCP) is a Transport layer protocol.
37. C. First, you should know easily that only TCP and UDP work at the Transport layer, so now you have a 50/50 shot. However, since the header has sequencing, acknowledgment, and window numbers, the answer can only be TCP.
38. C. The four layers of the DoD model are Application/Process, Host-to-Host, Internet, and Network Access. The Internet layer is equivalent to the Network layer of the OSI model.
39. C, E. Class A private address range is 10.0.0.0 through 10.255.255.255. Class B private address range is 172.16.0.0 through 172.31.255.255, and Class C private address range is 192.168.0.0 through 192.168.255.255.
40. B. The four layers of the TCP/IP stack (also called the DoD model) are Application/Process, Host-to-Host, Internet, and Network Access. The Host-to-Host layer is equivalent to the Transport layer of the OSI model.
42. C. The range of a Class B network address is 128–191. This makes our binary range 10xxxxxx.
43. D. DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP addres
44. D. A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits would never change.
45. D. A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets, so let’s add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer.
46. C. This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is 16 in the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.
47.C. C. 200.10.5.64
48. F. A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
49. B, D. The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 – 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.
50. D. A /30, regardless of the class of address, has a 252 in the fourth octet. This means we have a block size of 4 and our subnets are 0, 4, 8, 12, 16, etc. Address 14 is obviously in the 12 subnet.
No comments:
Post a Comment