CCNA_1_UPD (1130964), страница 5
Текст из файла (страница 5)
Which statements describe the logical token-passing topology? (Choosetwo.)Network usage is on a first come, first serve basis.Computers are allowed to transmit data only when they possess a token.Data from a host is received by all other hosts.Electronic tokens are passed sequentially to each other.Token passing networks have problems with high collision rates.7. A network administrator has been asked to provide a graphicrepresentation of exactly where the company network wiring andequipment are located in the building.
What is this type of drawing?logical topologyphysical topologycable pathwiring gridaccess topology8. What is the purpose of the preamble in an Ethernet frame?is used as a pad for dataidentifies the source addressidentifies the destination addressmarks the end of timing informationis used for timing synchronization with alternating patterns of ones and zeros9. What statements are true regarding addresses found at each layer of theOSI model? (Choose two.)Layer 2 may identify devices by a physical address burned into the network cardLayer 2 identifies the applications that are communicatingLayer 3 represents a hierarchical addressing schemeLayer 4 directs communication to the proper destination networkLayer 4 addresses are used by intermediary devices to forward data10.
Refer to the exhibit. Which statement describes the media accesscontrol methods that are used by the networks in the exhibit?All three networks use CSMA/CANone of the networks require media access control.Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.Network 1 uses CSMA/CA and Network 2 uses CSMA/CD.Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.11.
Refer to the exhibit. How many unique CRC calculations will take placeas traffic routes from the PC to the laptop?124812. Refer to the exhibit. A frame is being sent from the PC to the laptop.Which source MAC and IP addresses will be included in the frame as itleaves RouterB? (Choose two.)source MAC - PCsource MAC - S0/0 on RouterAsource MAC - Fa0/1 on RouterBsource IP - PCsource IP - S0/0 on RouterAsource IP - Fa0/1 of RouterB13. Which sublayer of the data link layer prepares a signal to be transmittedat the physical layer?LLCMACHDLCNIC14.
What two facts are true when a device is moved from one network orsubnet to another? (Choose two.)The Layer 2 address must be reassigned.The default gateway address should not be changed.The device will still operate at the same Layer 2 address.Applications and services will need additional port numbers assigned.The Layer 3 address must be reassigned to allow communications to the newnetwork.15. What is a function of the data link layer?Стр. 14 из 2701.04.2009 0:39CISCO CCNA Certifications: CCNA 1 UPDATEDprovidesprovidesprovidesprovides16.TheTheTheThehttp://cisco-ccna-certifications.blogspot.com/search/label/CCNA%20...the formatting of dataend-to-end delivery of data between hostsdelivery of data between two applicationsfor the exchange data over a common local mediaWhat is a characteristic of a logical point-to-point topology?nodes are physically connected.physical arrangement of the nodes is restricted.media access control protocol can be very simple.data link layer protocol used over the link requires a large frame header.17.
What is a primary purpose of encapsulating packets into frames?provide routes across the internetworkformat the data for presentation to the userfacilitate the entry and exit of data on mediaidentify the services to which transported data is associated18. What is the primary purpose of the trailer in a data link layer frame?define the logical topologyprovide media access controlsupport frame error detectioncarry routing information for the frame19.
What are three characteristics of valid Ethernet Layer 2 addresses?(Choose three.)They are 48 binary bits in length.They are considered physical addresses.They are generally represented in hexadecimal format.They consist of four eight-bit octets of binary numbers.They are used to determine the data path through the network.They must be changed when an Ethernet device is added or moved within thenetwork.comments (1)TOP04:10CCNA 1:Module 6POSTED BY ADMINOptions With Highlight Colours are Correct Answer1. Refer to the exhibit. Which network prefix will work with the IPaddressing scheme shown in the graphic./24/16/20/27/25/282.
Which IPv4 subnetted addresses represent valid host addresses? (Choosethree.)172.16.4.127 /26172.16.4.155 /26172.16.4.193 /26172.16.4.95 /27172.16.4.159 /27172.16.4.207 /273. Which statements are true regarding IP addressing? (Choose two.)NAT translates public addresses to private addresses destined for the Internet.Only one company is allowed to use a specific private network address space.Private addresses are blocked from public Internet by router.Network 172.32.0.0 is part of the private address space.IP address 127.0.0.1 can be used for a host to direct traffic to itself.4.
Which process do routers use to determine the subnet network addressbased upon a given IP address and subnet mask?binary addinghexadecimal andingbinary divisionbinary multiplicationbinary ANDing5. Refer to the exhibit. Host A is connected to the LAN, but it cannot getaccess to any resources on the Internet. The configuration of the host isshown in the exhibit. What could be the cause of the problem?The host subnet mask is incorrect.The default gateway is a network address.The default gateway is a broadcast address.The default gateway is on a different subnet from the host.6.
What subnet mask would a network administrator assign to a networkaddress of 172.30.1.0 if it were possible to have up to 254 hosts?Стр. 15 из 2701.04.2009 0:39CISCO CCNA Certifications: CCNA 1 UPDATEDhttp://cisco-ccna-certifications.blogspot.com/search/label/CCNA%20...255.255.0.0255.255.255.0255.255.254.0255.255.248.07. Which three IP addresses are private? (Choose three.)172.168.33.110.35.66.70192.168.99.5172.18.88.90192.33.55.89172.35.16.58. Given the IP address and subnet mask of 172.16.134.64255.255.255.224, which of the following would describe this address?This is a useable host address.This is a broadcast address.This is a network address.This is not a valid address.9.
A router interface has been assigned an IP address of 172.16.192.166with a mask of 255.255.255.248. To which subnet does the IP addressbelong?172.16.0.0172.16.192.0172.16.192.128172.16.192.160172.16.192.168172.16.192.17610. Refer to the exhibit. The network administrator has assigned theinternetwork of LBMISS an address range of 192.168.10.0. This addressrange has been subnetted using a /29 mask. In order to accommodate anew building, the technician has decided to use the fifth subnet forconfiguring the new network (subnet zero is the first subnet).
By companypolicies, the router interface is always assigned the first usable hostaddress and the workgroup server is given the last usable host address.Which configuration should be entered into the workgroup server'sproperties to allow connectivity to the network?IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway:192.168.10.39IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway:192.168.10.33IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway:192.168.10.33IP address: 192.168.10.39 subnet mask: 255.255.255.248 default gateway:192.168.10.31IP address: 192.168.10.254 subnet mask: 255.255.255.0 default gateway:192.168.10.111. Which of the following network devices are recommended to beassigned static IP addresses? (Choose three.)LAN workstationsserversnetwork printersroutersremote workstationslaptops12.
hich of the following are features of IPv6? (Choose three.)larger address spacefaster routing protocolsdata types and classes of serviceauthentication and encryptionimproved host naming conventionssame addressing scheme as IPv413. What is the primary reason for development of IPv6?securityheader format simplificationexpanded addressing capabilitiesaddressing simplification14. What two things will happen if a router receives an ICMP packet whichhas a TTL value of 1 and the destination host is several hops away? (Choosetwo.)The router will discard the packet.The router will decrement the TTL value and forward the packet to the next routeron the path to the destination host.The router will send a time exceeded message to the source host.The router will increment the TTL value and forward the packet to the next router onthe path to the destination host.The router will send an ICMP Redirect Message to the source host.15. Refer to the exhibit.















