CCNA 1 v3.1

Post on 31-Dec-2015

49 views 0 download

Tags:

description

CCNA 1 v3.1. Module 10 Review. What is the address that is changed when a frame is received at a router interface?. MAC address. What OSI layer offers reliable, connection-oriented data communication services?. transport. What IP packet field will prevent endless loops?. time-to-live. - PowerPoint PPT Presentation

Transcript of CCNA 1 v3.1

1

CCNA 1 v3.1

Module 10 Review

2

What is the address that is changed when a frame is

received at a router interface?

What is the address that is changed when a frame is

received at a router interface?

• MAC address

3

What OSI layer offers reliable, connection-oriented data

communication services?

What OSI layer offers reliable, connection-oriented data

communication services?

• transport

4

What IP packet field will prevent endless loops? What IP packet field will prevent endless loops?

• time-to-live

5

Which processes occur each time a packet is switched from one router

interface to another?

Which processes occur each time a packet is switched from one router

interface to another?

• encapsulation

• de-encapsulation

6

Which of the following are routed protocols?

(Choose three.)

Which of the following are routed protocols?

(Choose three.)

• IP• BGP• XNS• RIP• OSPF• DECnet

• IP• BGP• XNS• RIP• OSPF• DECnet

7

How would you describe path determination at the

network layer?

How would you describe path determination at the

network layer?

• router compares available routing table information to select the best path

8

What do routers use to exchange topological information?

What do routers use to exchange topological information?

• routing protocols

9

What are 3 metrics used with routing protocols?

What are 3 metrics used with routing protocols?

• delay

• cost

• reliability

10

What are 2 link-state routing protocols?

What are 2 link-state routing protocols?

• OSPF

• IS-IS

11

What are 3 benefits of subnetting?

What are 3 benefits of subnetting?

• smaller broadcast domains

• low-level security provided

• increased address flexibility

12

Given a host with the IP address 176.42.75.23 and a default subnet mask, to which network does the host belong?

Given a host with the IP address 176.42.75.23 and a default subnet mask, to which network does the host belong?

• 176.42.0.0

13

A small company has a class C network license and needs to create eight usable

subnets, each subnet capable of accommodating at least 14 hosts. What

is the appropriate subnet mask?

A small company has a class C network license and needs to create eight usable

subnets, each subnet capable of accommodating at least 14 hosts. What

is the appropriate subnet mask?

• 255.255.255.240

14

How many bits are available for Class B host IP addresses using

the default subnet mask?

How many bits are available for Class B host IP addresses using

the default subnet mask?

• 16

15

What is true concerning the host bits of the network address and

the broadcast address?

What is true concerning the host bits of the network address and

the broadcast address?

• Host bits of the network address are all equal to 0.

• Host bits of the broadcast address are all equal to 1.

16

How many usable subnets are created by applying the subnet mask 255.255.255.0 to a Class B network?

How many usable subnets are created by applying the subnet mask 255.255.255.0 to a Class B network?

• 254

17

What do you call the process that routers use to determine the subnet network

address based upon a given IP address and subnet mask?

What do you call the process that routers use to determine the subnet network

address based upon a given IP address and subnet mask?

• binary ANDing

18

• Switches forward broadcast storms.• Switches block broadcasts.• Switches handle broadcasts in similar fashion to

routers.• Routers can be segmented to increase bandwidth.• Routers block broadcasts.• Routers and switches provide security and

bandwidth control to overcome broadcast storms.

• Switches forward broadcast storms.• Switches block broadcasts.• Switches handle broadcasts in similar fashion to

routers.• Routers can be segmented to increase bandwidth.• Routers block broadcasts.• Routers and switches provide security and

bandwidth control to overcome broadcast storms.

Which statements describe the effects broadcast storms have on

networking equipment? (Choose two.)

Which statements describe the effects broadcast storms have on

networking equipment? (Choose two.)

19

• Protocol types• Encapsulations• Metrics• MAC addresses• Inbound interfaces• Outbound interfaces

What information is listed in routing tables? (Choose three.)

What information is listed in routing tables? (Choose three.)

• Protocol types• Encapsulations• Metrics• MAC addresses• Inbound interfaces• Outbound interfaces

20

What is the routing metric for RIPv1?

What is the routing metric for RIPv1?

• hop

21

• Layer 3 header is removed and replaced at every Layer 3 device.

• Layer 2 and Layer 3 addresses do not change when the packet traverse.

• Layer 3 source and destination addresses do not change when the packet traverse.

• Layer 2 frame header and trailer are removed and replaced at every Layer 3 device.

• Layer 2 source and destination addresses do not change when the packet travels.

Which statements describe Layer 2 and Layer 3 packet address changes as the packet traverses from router

to router? (Choose two.)

Which statements describe Layer 2 and Layer 3 packet address changes as the packet traverses from router

to router? (Choose two.)• Layer 3 header is removed and replaced at

every Layer 3 device.• Layer 2 and Layer 3 addresses do not change

when the packet traverse.• Layer 3 source and destination addresses do

not change when the packet traverse.• Layer 2 frame header and trailer are removed

and replaced at every Layer 3 device.• Layer 2 source and destination addresses do

not change when the packet travels.

22

What are two differences between routers and

switches?

What are two differences between routers and

switches?

• Routers make forwarding decisions using IP addresses, but switches use MAC addresses.

• Switches forward broadcasts and routers do not.

23

What are two functions of a routing protocol?

What are two functions of a routing protocol?

• provides processes for sharing route information

• allows a router to communicate with other routers

24

How many usable class C subnetworks are created with a

subnet mask of 255.255.255.240?

How many usable class C subnetworks are created with a

subnet mask of 255.255.255.240?

• 14

25

Company XYZ uses a network address of 192.168.4.0. It uses the mask of

255.255.255.192 to create subnets. What is the maximum number of usable hosts

in each subnet?

Company XYZ uses a network address of 192.168.4.0. It uses the mask of

255.255.255.192 to create subnets. What is the maximum number of usable hosts

in each subnet?

• 62

26

Which are the network and broadcast addresses when given an IP host

address of 198.101.6.55/27?

Which are the network and broadcast addresses when given an IP host

address of 198.101.6.55/27?

• Network = 198.101.6.32

• Broadcast = 198.101.6.63