CISCO CCNA Test 1 Questions with Answers
What will happen if a private IP address is assigned to a public interface connected to an ISP? - Answer-A. Addresses in a private range will be not be routed on the Internet backbone.
Which two benefits are provided by using a hierarchical addressing n...
CISCO CCNA Test 1 Questions
with Answers
What will happen if a private IP address is assigned to a public interface connected to
an ISP? - Answer-A. Addresses in a private range will be not be routed on the Internet
backbone.
Which two benefits are provided by using a hierarchical addressing network addressing
scheme? (Choose two.) - Answer-A. reduces routing table entries
E. ease of management and troubleshooting
What is the alternative notation for the IPv6 address
B514:82C3:0000:0000:0029:EC7A:0000:EC72? - Answer-D. B514 : 82C3 :: 0029 :
EC7A : 0 : EC72
All hosts have connectivity with one another. Which statements describe the addressing
scheme that is in use in the network? (Choose three.) - Answer-B. The subnet mask in
use is 255.255.255.128.
C. The IP address 172.16.1.25 can be assigned to hosts in VLAN1
F. The LAN interface of the router is configured with multiple IP addresses.
Which two statements describe characteristics of IPv6 unicast addressing? (Choose
two.) - Answer-A. Global addresses start with 2000::/3.
D. There is only one loopback address and it is ::1.
The network administrator has been asked to give reasons for moving from IPv4 to
IPv6. What are two valid reasons for adopting IPv6 over IPv4? (Choose two.) - Answer-
A. no broadcast
E. autoconfiguration
An administrator must assign static IP addresses to the servers in a network. For
network 192.168.20.24/29, the router is assigned the first usable host address while the
sales server is given the last usable host address. Which of the following should be
entered into the IP properties box for the sales server? - Answer-C. IP address:
192.168.20.30 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.25
Which subnet mask would be appropriate for a network address range to be subnetted
for up to eight LANs, with each LAN containing 5 to 26 hosts? - Answer-D.
255.255.255.224
How many bits are contained in each field of an IPv6 address? - Answer-D. 16
,What are three approaches that are used when migrating from an IPv4 addressing
scheme to an IPv6 scheme. (Choose three.) - Answer-A. enable dual-stack routing
C. configure IPv4 tunnels between IPv6 islands
D. use proxying and translation to translate IPv6 packets into IPv4 packets
In this VLSM addressing scheme, what summary address would be sent from router A?
- Answer-A. 172.16.0.0 /16
How is an EUI-64 format interface ID created from a 48-bit MAC address? - Answer-D.
by inserting 0xFFFE between the upper three bytes and the lower three bytes of the
MAC address
What is the most efficient summarization that R1 can use to advertise its networks to
R2? - Answer-C. 172.1.4.0/22
Which option is a valid IPv6 address? - Answer-D. 2004:1:25A4:886F::1
Which three are characteristics of an IPv6 anycast address? (Choose three.) - Answer-
B. one-to-nearest communication model
E. the same address for multiple devices in the group
F. delivery of packets to the group interface that is closest to the sending device
A national retail chain needs to design an IP addressing scheme to support a
nationwide network. The company needs a minimum of 300 sub-networks and a
maximum of 50 host addresses per subnet. Working with only one Class B address,
which of the following subnet masks will support an appropriate addressing scheme?
(Choose two.) - Answer-B. 255.255.255.128
E. 255.255.255.192
A network administrator is adding two new hosts to SwitchA. Which three values could
be used for the configuration of these hosts? (Choose three.) - Answer-A. host A IP
address: 192.168.1.79
C. host A default gateway: 192.168.1.78
F. host B IP address: 192.168.1.190
Which IPv6 address is the all-router multicast group? - Answer-B. FF02::2
Which address range efficiently summarizes the routing table of the addresses for
router Main? - Answer-172.16.0.0./20
Which IPv6 address is valid? - Answer-D. 2031:0:130F::9C0:876A:130B
What will Router1 do when it receives the data frame shown? (Choose three.) - Answer-
A. Router1 will strip off the source MAC address and replace it with the MAC address
0000.0c36.6965
, C. Router1 will strip off the destination MAC address and replace it with the MAC
address 0000.0c07.4320.
F. Router1 will forward the data packet out interface FastEthernet0/2.
Which three statements correctly describe Network Device A? (Choose three.) -
Answer-B. With a network wide mask of 255.255.255.128, each interface does require
an IP address on a unique IP subnet.
D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to
communicate with each other.
E. With a network wide mask of 255.255.254.0, each interface does not require an IP
address.
Which layer in the OSI reference model is responsible for determining the availability of
the receiving program and checking to see if enough resources exist for that
communication? - Answer-E. application
Which of the following describes the roles of devices in a WAN? (Choose three.) -
Answer-A. A CSU/DSU terminates a digital local loop.
D. A modem terminates an analog local loop.
E. A router is commonly considered a DTE device.
Host A pings interface S0/0 on router 3. What is the TTL value for that ping? - Answer-
B. 253
A network administrator is verifying the configuration of a newly installed host by
establishing an FTP connection to a remote server. What is the highest layer of the
protocol stack that the network administrator is using for this operation? - Answer-A.
application
After HostA pings HostB, which entry will be in the ARP cache of HostA to support this
transmission? - Answer-A.
A network interface port has collision detection and carrier sensing enabled on a shared
twisted pair network. From this statement, what is known about the network interface
port? - Answer-C. This is an Ethernet port operating at half duplex.
A receiving host computes the checksum on a frame and determines that the frame is
damaged. The frame is then discarded. At which OSI layer did this happen? - Answer-
D. data link
Which of the following correctly describe steps in the OSI data encapsulation process?
(Choose two.) - Answer-A. The transport layer divides a data stream into segments and
may add reliability and flow control information.
D. Packets are created when the network layer adds Layer 3 addresses and control
information to a segment.
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Perfectscorer. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €13,08. Je zit daarna nergens aan vast.