Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CCNA 200-301: Chapter 1-7: Networking Fundamentals Exercises and Solutions, Exams of Computer Networks

A set of exercises and solutions covering networking fundamentals, specifically focusing on the tcp/ip model, ethernet standards, and basic routing concepts. It includes multiple-choice questions with answers, addressing topics like data encapsulation, osi model layers, ethernet addressing, and routing protocols. Suitable for students preparing for the ccna 200-301 exam or anyone seeking to enhance their understanding of networking principles.

Typology: Exams

2024/2025

Available from 02/11/2025

BetaTutors
BetaTutors ๐Ÿ‡บ๐Ÿ‡ธ

4.5

(4)

1.5K documents

1 / 13

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CCNA 200-301: CHAPTER 1 โ€“ 7: QUESTIONS WITH 100%
VERIFIED SOLUTONS
1) Which of the following protocols are examples of TCP/IP transport layer protocols?
(Choose two answers.)
a. Ethernet
b. Http
c. IP
d. UDP
e. SMTP
f. TCP -- Correct Answer โœ”โœ” 1. D and F
2) Which of the following protocols are examples of TCP/IP data-link protocol?
(Choose two answers)
a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP -- Correct Answer โœ”โœ” 1. A and G
3) The process of HTTP asking TCP to send some data and making sure that it is
received correctly is an example of what?
a. Same-Layer interaction
b. Adjacent-layer interaction
c. OSI model
d. All of these answers are correct -- Correct Answer โœ”โœ” 1. B
4) The process of TCP on one computer marking a TCP segment as segment 1, and the
receiving computer then acknowledging the receipt of TCP segment 1 is an example
of what?
pf3
pf4
pf5
pf8
pf9
pfa
pfd

Partial preview of the text

Download CCNA 200-301: Chapter 1-7: Networking Fundamentals Exercises and Solutions and more Exams Computer Networks in PDF only on Docsity!

CCNA 200-301: CHAPTER 1 โ€“ 7: QUESTIONS WITH 100%

VERIFIED SOLUTONS

  1. Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two answers.) a. Ethernet b. Http c. IP d. UDP e. SMTP f. TCP -- Correct Answer โœ”โœ” 1. D and F
  2. Which of the following protocols are examples of TCP/IP data-link protocol? (Choose two answers) a. Ethernet b. HTTP c. IP d. UDP e. SMTP f. TCP g. PPP -- Correct Answer โœ”โœ” 1. A and G
  3. The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what? a. Same-Layer interaction b. Adjacent-layer interaction c. OSI model d. All of these answers are correct -- Correct Answer โœ”โœ” 1. B
  4. The process of TCP on one computer marking a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of TCP segment 1 is an example of what?

a. Data encapsulation b. Same-layer interaction c. Adjacent-layer interaction d. OSI model e. All of these answers are correct -- Correct Answer โœ”โœ” 1. B

  1. The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data-link header and trailer, is an example of what? a. Data encapsulation b. Same-layer interaction c. OSI model d. All of these answers are correct -- Correct Answer โœ”โœ” 1. A
  2. Which of the following terms is used specifically to identify the entity created when encapsulating data inside data-link layer headers and trailers? a. Data b. Chunk c. Segment d. Frame e. Packet -- Correct Answer โœ”โœ” 1. D
  3. Which OSI encapsulation term can be used instead of the term frame? a. Layer 1 PDU b. Layer 2 PDU c. Layer 3 PDU d. Layer 5 PDU e. Layer 7 PDU -- Correct Answer โœ”โœ” 1. B
  4. In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN? a. Only the devices that use cables are using Ethernet b. Only the devices that use wireless are using Ethernet c. both the devices using cables and those using wireless are using Ethernet d. None of the devices are using Ethernet -- Correct Answer โœ”โœ” A

a. The algorithm never allows collisions to occur b. Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover c. The algorithm works with only two devices on the same ethernet d. None of the other answers is correct -- Correct Answer โœ”โœ” 1. B

  1. Which of the following is true about the Ethernet FCS field? a. Ethernet uses FCS for error recover b. It is 2 bytes long c. It resides in the Ethernet trailer, not the Ethernet header d. It is used for encryption -- Correct Answer โœ”โœ” 1. C
  2. Which of the following are true about the format of Ethernet addresses? (Choose three answers) a. Each manufacturer puts a unique OUI code into the first 2 bytes of the address b. Each manufacturer puts a unique OUI code into the first 3 bytes of the address c. Each manufacturer puts a unique OUI code into the first half of the address d. The part of the address that holds this manufacturer's code is called the MAC e. The part of the address that holds this manufacturer's code is called the OUI f. The part of the address that holds this manufacturer's code has no specific name -- Correct Answer โœ”โœ” 1. B, C, and E
  3. Which of the following terms describe Ethernet addresses that can be used to send one frame that is delivered to multiple devices on the LAN? (Choose two answers.) a. Burned-in address b. Unicast address c. Broadcast address d. Multicast address -- Correct Answer โœ”โœ” 1. C and D
  4. Which of the following fields in the HDLC header used by Cisco routers does Cisco add, beyond the ISO standard HDLC a. Flag b. Type c. Address

d. FCS -- Correct Answer โœ”โœ” 1. B

  1. Two routers, R1 and R2, connect using an Ethernet over MPLS service. The service provides point-to-point service between these two routers only, as a Layer 2 Ethernet service. Which of the following are the most likely to be true about this WAN? (Choose two answers) a. R1 will connect to a physical Ethernet link, with the other end of the cable connected to R b. R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence c. R1 will forward data-link frames to R2 using an HDLC header/trailer d. R1 will forward data-link frames to R2 using an Ethernet header/trailer -- Correct Answer โœ”โœ” 1. B, D
  2. Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with PC1 sharing the Ethernet with Router and PC2 sharing the Ethernet with sharing the Ethernet with Router 2. When PC sends data to PC2, which of the following is true? a. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again. b. ROuter1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to ROuter2, which extracts the Ethernet frame for forwarding to PC c. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by Router2 before forwarding data to PC d. Router1 removes the Ehternet, IP, and TCP headers and rebuilds the appropriated headers before forwarding the packet to Router2 -- Correct Answer โœ”โœ” 1. A
  3. Which of the following does a router normally use when making a decision about routing TCP/IP packets? a. Destination MAC address b. Source MAC address c. Destination IP address d. Source IP address e. Destination MAC and IP addresses -- Correct Answer โœ”โœ” C

b. Enable mode c. Global configuration mode d. Interface configuration mode -- Correct Answer โœ”โœ” B

  1. Which of the following is a difference between Telnet and SSH as supported by a Cisco switch a. SSH encrypts the passwords used at login, but not other traffic; Telnet encrypts nothing b. SSH encrypts all data exchange, including login passwords; Telnet encrypts nothing c. Telnet is used from Microsoft operating systems, and SSH is used from UNIX and Linux operation systems d. Telnet encrypts only password exchanges; SSH encyrpts all data exchanges -- Correct Answer โœ”โœ” B
  2. What type of switch memory isused to store the configuration used by the switch when it is up and working a. RAM b. ROM c. Flash d. NVRAM e. Bubble -- Correct Answer โœ”โœ” A
  3. What command copies the configuration from RAM into NVRAM a. copy running-config tftp b. copy tftp running-config c. copoy running-config start-up-config d. copy start-up-config running-config e. copy startup-confipg running-config f. copy running-config startup-config -- Correct Answer โœ”โœ” F
  4. A switch user is currently in console line configuration mode. Which of the following would place the user in enable mode? (Choose two answers) a. Using the exit command once b. Using the end command once c. Pressing the Ctrl+Z key sequence once

d. Using the quit command -- Correct Answer โœ”โœ” B,C

  1. Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address? a. It compares the unicast destination address to the bridging, or MAC address, table b. It compares the unicast source address to the bridging, or MAC address, table c. It forwards the frame out all interfaces in the same vlan except for the incoming interface d. It compares the destination IP address to the destination MAC address e. It compares the frame's incoming interface to the source MAC entry in the Mac address table -- Correct Answer โœ”โœ” A
  2. Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address? a. It compares the unicast destination address to the bridging, or MAC address, table b. It compares the unicast source address to the bridging, or Mac address, table c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface d. It compares the destination IP address to the destination MAC address e. It compares the frame's incoming interface to the source MAC entry in the MAC address table. -- Correct Answer โœ”โœ” C
  3. Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address? a. It forwards out all interfaces in the same VLAN except for the incoming interface b. It forwards the frame out the one interface identified by the matching entry in the MAC address table c. It compares the destination IP address to the destination MAC address d. It compares the frame's incoming interface to the source MAC entry in the MAC address table -- Correct Answer โœ”โœ” A
  4. Which of the following comparisons does a switch make when deciding whether a new MAC address should be added to its MAC address table?
  1. Image that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? a. enable password b. enable secret c. Neither d. The password command, if it is configured -- Correct Answer โœ”โœ” B
  2. An engineer wants to set up simple password protection with no usernames for some switches in a lab, for the purposes of keeping curious coworkers from logging in to the lab switches from their desktop PCs. Which of the following commands would be a user part of that configuration a. A login vty mode subcommand b. A password password console subcommand c. A login local vty subcommand d. A transport input ssh vty subcommand -- Correct Answer โœ”โœ” A
  3. An engineer had formerly configured a Cisco 2960 switch to allow Telnet access so that the switch expected a password of mypassword from the Telnet user. The engineer then changed the configuration to support Secure Shell. Which of the following commands could have been part of the new configuration? (Choose two answers) a. A username name secret password vty mode subcommand b. A username name secret password global configuration command c. A login local vty mode subcommand d. A transport input ssh global configuration command -- Correct Answer โœ”โœ” B,C
  4. An engineer's desktop PC connects to a switch at the main site. A router at the main site connects to each branch office through a serial link, with one small router and switch at each branch. Which of the following commands must be configured on the branch office switches, in the listed configuration mode, to allow the engineer to telnet to the branch office switches and supply only a password to login? (Choose three answers.) a. The ip address command in interface configuration mode b. The ip address command in global configuration mode

c. The ip default-gateway command in VLAN configuration mode d. The ip defualt-gateway command in global configuration mode e. The password command in console line configuration mode f. The password command in vty line configuration mode -- Correct Answer โœ”โœ” A,D,F

  1. A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250 (with mask 255.255.255.0) is reserved for use by this new LAN switch and that 172.16.2.254 is already configured on the router connected to the same VLAN. The switch needs to support SSH connections into the switch form any subnet in the network. Which of the following commands are part of the required configuration in this case? (Choose two answers) a. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 1 configuration mode b. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 configuration mode c. The ip default-gateway 172.16.2.254 command in global configuration mode d. The switch cannot support SSH because all its ports connect to VLAN 2, and the IP address must be configured on interface VLAN 1 -- Correct Answer โœ”โœ” B,C
  2. Which of the following line subcommands tells a switch to wait until a show command's output has completed before displaying log messages on the screen? a. logging synchronous b. no ip domain-lookup c. exec-timeout 0 0 d. history size 15 -- Correct Answer โœ”โœ” A
  3. Which of the following describes a way to disable IEEE standard autonegotiation on a 10/100 port on a Cisco switch? a. Configure the negotiate disable interface subcommand b. Configure the no negotiate interface subcommand c. Configure the speed 100 interface subcommand d. Configure the duplex half interface subcommand e. Configure the duplex full interface subcommand

interface. Which of the following are true about the link after it comes up? (Choose two answers) a. The link works at 1000 Mbps (1 Gbps) b. SW1 attempts to run at 10 Mbps because Sw2 has effectively disabled IEEE standard autonegotiation c. The link runs at 1 Gbps, but SW1 uses half duplex and Sw2 uses full duplex d. Both switches use full duplex -- Correct Answer โœ”โœ” A,D

  1. Switch SW1 connects via a cable to switch SW2's G0/1 port. Which of the following conditions is the most likely to cause Sw1's late collision counter to continue to increment? a. SW2's G0/1 has been configured with a shutdown interface subcommand b. The two switches have been configured with different values on the speed interface subcommand c. A duplex mismatch exists with SW1 set to full duplex d. A duplex mismatch exists with SW1 to set to half duplex -- Correct Answer โœ”โœ” D