CCNA1 Chapter 5 Exam & Answer

Soal Beserta jawaban Latihan CCNA 1
CHAPTER 5
STMIK Nusa Mandiri Jakarta




1. What statement describes Ethernet?
It defines a standard model used to describe how networking works.
It defines the most common LAN type in the world.
It is the required Layer 1 and 2 standard for Internet communication.
It connects multiple sites such as routers located in different countries.\



2. Which switching method uses the CRC value in a frame?
fast-forward
cut-through
fragment-free
store-and-forward



3.
The exhibit shows a network topology. PC1 and PC2 are connected to the Fa0/1 and Fa0/2 ports of the SW1 switch, respectively. SW1 is connected through its Fa0/3 port to the Fa0/0 interface of the RT1 router. RT1 is connected through its Fa0/1 to the Fa0/2 port of SW2 switch. SW2 is connected through its Fa0/1 port to the PC3.
Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?​
PC2 will send an ARP reply with its MAC address.
SW1 will send an ARP reply with its Fa0/1 MAC address.​
SW1 will send an ARP reply with the PC2 MAC address.​
RT1 will send an ARP reply with the PC2 MAC address.​
RT1 will send an ARP reply with its Fa0/0 MAC address.​



4. What addressing information is recorded by a switch to build its MAC address table?
the source Layer 2 address of incoming frames
the destination Layer 2 address of outgoing frames
the source Layer 3 address of outgoing packets
the destination Layer 3 address of incoming packets



5. 
Three hosts (labeled A, B, and C) connect to a switch that connects to router R1. Router R1 connects through a serial connection to router R2. R2 connects to a switch that connects to host D.
Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?
only hosts B and C
only host D
only hosts B, C, and router R1
only hosts A, B, and C
only hosts A, B, C, and D
only router R1



6.
Switch1 has four PCs attached: host A 10.55.5.8; host B 10.55.5.9; host C 10.55.5.10; and host D 10.55.5.11. Below the PCs is the ARP table for host A with the following information:
Internet Address    Physical Address       Type
   10.55.5.9           AA:AA:AA:AA:AA:AA   dynamic
   10.55.5.10         BB:BB:BB:BB:BB:BB   dynamic
Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?
Host D sends an ARP request to host A.
Host A sends out the packet to the switch. The switch sends the packet only to the host D, which in turn responds.
Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.
Host A sends an ARP request to the MAC address of host D.



7. What is auto-MDIX?
a type of port on a Cisco switch
a feature that detects Ethernet cable typ​e
a type of Cisco switch
an Ethernet connector type



8. Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)
The LLC sublayer is responsible for the placement and retrieval of frames on and off the media.
Logical link control is implemented in software.
The LLC sublayer adds a header and a trailer to the data.
The data link layer uses LLC to communicate with the upper layers of the protocol suite.
Logical link control is specified in the IEEE 802.3 standard.

9.
On the right side of the graphic, there are 4 PCs connected to a switch. PC1 connects to port 4 of the switch and has a MAC of 12-34-56-78-9A-BC. PC2 connects to port 3 of the switch and has a MAC of 12-34-56-78-9A-BD. PC3 connects to port 2 of the switch and has a MAC of 12-34-56-78-9A-BE. PC4 connects to port 1 of the switch and has a MAC of 12-34-56-78-9A-BF. On the left side of the graphic there is a MAC Address Table. Port 1 has a MAC entry of 12-34-56-78-9A-BF and port 3 has a MAC entry of 12-34-56-78-9A-BD.
Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?
The switch will forward the frame to all ports except port 4.
The switch will forward the frame only to port 2.
The switch will discard the frame.
The switch will forward the frame to all ports.
The switch will forward the frame only to ports 1 and 3.



10. What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?
64 bytes
512 bytes
1024 bytes
1500 bytes



11. What statement describes a characteristic of MAC addresses?
They have a 32-bit binary value.
They must be globally unique.
They are added as part of a Layer 3 PDU.
They are only routable within the private network.



12. Option 3: checks the frame length before forwarding. Press spacebar to enter matching mode. 
Match the characteristic to the forwarding method. (Not all options are used.)



cut-through
has low latency
may forward runt frames
begins forwarding when the destination address is received
store-and-forward
always stores the entire frame
checks the CRC before forwarding
checks the frame length before forwarding


13. Which destination address is used in an ARP request frame?
FFFF.FFFF.FFFF
01-00-5E-00-AA-23
0.0.0.0
127.0.0.1
255.255.255.255



14. What is a characteristic of port-based memory buffering?
All frames are stored in a common memory buffer.
Frames are buffered in queues linked to specific ports.
Frames in the memory buffer are dynamically linked to destination ports.
All ports on a switch share a single memory buffer.



15. What happens to runt frames received by a Cisco Ethernet switch?
The frame is dropped.
The frame is sent to the default gateway.
The frame is broadcast to all other devices on the same network.
The frame is returned to the originating network device.



16. Which statement is true about MAC addresses?
The first three bytes are used by the vendor assigned OUI.
A NIC only needs a MAC address if connected to a WAN.
The ISO is responsible for MAC addresses regulations.
MAC addresses are implemented by software.



17. Which statement describes the treatment of ARP requests on the local link?
They are dropped by all switches on the local network.
They are received and processed by every device on the local network.
They are received and processed only by the target device.
They must be forwarded by all routers on the local network.



18. The ARP table in a switch maps which two types of address together?
Layer 2 address to a Layer 4 address
Layer 3 address to a Layer 2 address
Layer 4 address to a Layer 2 address
Layer 3 address to a Layer 4 address



19. What is the aim of an ARP spoofing attack?
to fill switch MAC address tables with bogus addresses
to overwhelm network hosts with ARP requests
to flood the network with ARP reply broadcasts
to associate IP addresses to the wrong MAC address



20. True or False?
When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway.
true
false



21. What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)
128 bytes
64 bytes
56 bytes
1024 bytes
1518 bytes



22. What are two potential network problems that can result from ARP operation? (Choose two.)
Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port.
Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.
Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing.
On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.
Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network.



sumber : https://www.ccna7.com/ccna1-v6-0/ccna1-v6-0-chapter-5-exam-answer-2017-100/amp/

0 komentar:

Copyright © 2013 Sulhansubs