CCNA1 Chapter 5 Exam & Answer
Soal Beserta jawaban Latihan CCNA 1
CHAPTER 5
STMIK Nusa Mandiri Jakarta
1. What statement describes Ethernet?
It
defines a standard model used to describe how networking works.
It
defines the most common LAN type in the world.
It
is the required Layer 1 and 2 standard for Internet communication.
It
connects multiple sites such as routers located in different countries.\
2. Which switching method uses the CRC value in a frame?
fast-forward
cut-through
fragment-free
store-and-forward
3.
The exhibit shows a network topology. PC1 and PC2 are connected
to the Fa0/1 and Fa0/2 ports of the SW1 switch, respectively. SW1 is connected
through its Fa0/3 port to the Fa0/0 interface of the RT1 router. RT1 is
connected through its Fa0/1 to the Fa0/2 port of SW2 switch. SW2 is connected
through its Fa0/1 port to the PC3.
Refer to the exhibit. PC1 issues an ARP request because it needs
to send a packet to PC2. In this scenario, what will happen next?
PC2
will send an ARP reply with its MAC address.
SW1
will send an ARP reply with its Fa0/1 MAC address.
SW1
will send an ARP reply with the PC2 MAC address.
RT1
will send an ARP reply with the PC2 MAC address.
RT1
will send an ARP reply with its Fa0/0 MAC address.
4. What addressing information is recorded by a switch to build its
MAC address table?
the
source Layer 2 address of incoming frames
the
destination Layer 2 address of outgoing frames
the
source Layer 3 address of outgoing packets
the
destination Layer 3 address of incoming packets
5.
Three hosts (labeled A, B, and C) connect to a switch that
connects to router R1. Router R1 connects through a serial connection to router
R2. R2 connects to a switch that connects to host D.
Refer to the exhibit. The switches are in their default
configuration. Host A needs to communicate with host D, but host A does not
have the MAC address for its default gateway. Which network hosts will receive
the ARP request sent by host A?
only
hosts B and C
only
host D
only
hosts B, C, and router R1
only
hosts A, B, and C
only
hosts A, B, C, and D
only
router R1
6.
Switch1 has four PCs attached: host A 10.55.5.8; host B
10.55.5.9; host C 10.55.5.10; and host D 10.55.5.11. Below the PCs is the ARP
table for host A with the following information:
Internet Address Physical Address Type
10.55.5.9 AA:AA:AA:AA:AA:AA dynamic
10.55.5.10 BB:BB:BB:BB:BB:BB dynamic
Internet Address Physical Address Type
10.55.5.9 AA:AA:AA:AA:AA:AA dynamic
10.55.5.10 BB:BB:BB:BB:BB:BB dynamic
Refer to the exhibit. A switch with a default configuration
connects four hosts. The ARP table for host A is shown. What happens when host
A wants to send an IP packet to host D?
Host
D sends an ARP request to host A.
Host
A sends out the packet to the switch. The switch sends the packet only to the
host D, which in turn responds.
Host
A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the
switch receives the broadcast and host D responds with its MAC address.
Host
A sends an ARP request to the MAC address of host D.
7. What is auto-MDIX?
a type
of port on a Cisco switch
a
feature that detects Ethernet cable type
a
type of Cisco switch
an Ethernet
connector type
8. Which two statements describe features or functions of the
logical link control sublayer in Ethernet standards? (Choose two.)
The
LLC sublayer is responsible for the placement and retrieval of frames on and
off the media.
Logical
link control is implemented in software.
The
LLC sublayer adds a header and a trailer to the data.
The
data link layer uses LLC to communicate with the upper layers of the protocol
suite.
Logical
link control is specified in the IEEE 802.3 standard.
9.
On the right side of the graphic, there are 4 PCs connected to a
switch. PC1 connects to port 4 of the switch and has a MAC of
12-34-56-78-9A-BC. PC2 connects to port 3 of the switch and has a MAC of
12-34-56-78-9A-BD. PC3 connects to port 2 of the switch and has a MAC of
12-34-56-78-9A-BE. PC4 connects to port 1 of the switch and has a MAC of
12-34-56-78-9A-BF. On the left side of the graphic there is a MAC Address Table.
Port 1 has a MAC entry of 12-34-56-78-9A-BF and port 3 has a MAC entry of
12-34-56-78-9A-BD.
Refer to the exhibit. The exhibit shows a small switched network
and the contents of the MAC address table of the switch. PC1 has sent a frame
addressed to PC3. What will the switch do with the frame?
The
switch will forward the frame to all ports except port 4.
The
switch will forward the frame only to port 2.
The
switch will discard the frame.
The
switch will forward the frame to all ports.
The
switch will forward the frame only to ports 1 and 3.
10. What is the minimum Ethernet frame size that will not be
discarded by the receiver as a runt frame?
64
bytes
512
bytes
1024
bytes
1500
bytes
11. What statement describes a characteristic of MAC addresses?
They
have a 32-bit binary value.
They
must be globally unique.
They
are added as part of a Layer 3 PDU.
They
are only routable within the private network.
12. Option 3: checks the
frame length before forwarding. Press spacebar to enter matching mode.
Match the characteristic to the forwarding method. (Not all
options are used.)
cut-through
has low latency
may forward runt frames
begins forwarding when the destination address is received
store-and-forward
always stores the entire frame
checks the CRC before forwarding
checks the frame
length before forwarding
13. Which destination address is used in an ARP request frame?
FFFF.FFFF.FFFF
01-00-5E-00-AA-23
0.0.0.0
127.0.0.1
255.255.255.255
14. What is a characteristic of port-based memory buffering?
All
frames are stored in a common memory buffer.
Frames
are buffered in queues linked to specific ports.
Frames
in the memory buffer are dynamically linked to destination ports.
All
ports on a switch share a single memory buffer.
15. What happens to runt frames received by a Cisco Ethernet switch?
The
frame is dropped.
The
frame is sent to the default gateway.
The
frame is broadcast to all other devices on the same network.
The
frame is returned to the originating network device.
16. Which statement is true about MAC addresses?
The
first three bytes are used by the vendor assigned OUI.
A
NIC only needs a MAC address if connected to a WAN.
The
ISO is responsible for MAC addresses regulations.
MAC
addresses are implemented by software.
17. Which statement describes the treatment of ARP requests on the
local link?
They
are dropped by all switches on the local network.
They
are received and processed by every device on the local network.
They
are received and processed only by the target device.
They
must be forwarded by all routers on the local network.
18. The ARP table in a switch maps which two types of address
together?
Layer
2 address to a Layer 4 address
Layer
3 address to a Layer 2 address
Layer
4 address to a Layer 2 address
Layer
3 address to a Layer 4 address
19. What is the aim of an ARP spoofing attack?
to
fill switch MAC address tables with bogus addresses
to
overwhelm network hosts with ARP requests
to
flood the network with ARP reply broadcasts
to
associate IP addresses to the wrong MAC address
20. True or False?
When a device is sending data to another device on a remote network, the
Ethernet frame is sent to the MAC address of the default gateway.
true
false
21. What are the two sizes (minimum and maximum) of an Ethernet
frame? (Choose two.)
128 bytes
64 bytes
56
bytes
1024 bytes
1518
bytes
22. What are two potential network problems that can result from ARP
operation? (Choose two.)
Multiple
ARP replies result in the switch MAC address table containing entries that
match the MAC addresses of hosts that are connected to the relevant switch
port.
Network
attackers could manipulate MAC address and IP address mappings in ARP messages
with the intent of intercepting network traffic.
Manually
configuring static ARP associations could facilitate ARP poisoning or MAC
address spoofing.
On
large networks with low bandwidth, multiple ARP broadcasts could cause data
communication delays.
Large
numbers of ARP request broadcasts could cause the host MAC address table to
overflow and prevent the host from communicating on the network.
sumber : https://www.ccna7.com/ccna1-v6-0/ccna1-v6-0-chapter-5-exam-answer-2017-100/amp/
0 komentar: