Ccna Networks MCQ
Ccna Networks MCQ
Ccna Networks MCQ
Donations
CCNA 1 - v7 CCNA 2 - v7
CCNA 3 - v7
Modules 1 - 3: Basic
Network Connectivity and
Communications Exam
Answers
Modules 4 - 7: Ethernet
Concepts Exam Answers
Modules 8 - 10:
Communicating Between
Networks Exam Answers
Modules 11 - 13: IP
Addressing Exam
Answers
How to find: Press “Ctrl + F” in the browser and fill in [Final Skills] ITN Final
whatever wording is in the question to find that Skills Exam (PTSA)
question/answer. If the question is not here, find it in
ITNv7 Practice Final
Questions Bank.
Exam
7.00) – ITNv7 Final Exam Answers Full 17.6.5 Check Your Understanding –
Troubleshooting Methodologies
Number of questions: 60; Passed score: 80- Answers
DNS
email
file
web
Explain:
A DNS server stores records that are used to resolve IP
addresses to host names. Some DNS record types
include the following:
A – an end device IPv4 address
NS – an authoritative name server
AAAA – an end device IPv6 address
MX – a mail exchange record
Explain:
Proprietary protocols have their definition and operation
controlled by one company or vendor. Some of them can
be used by different organizations with permission from
the owner. The TCP/IP protocol suite is an open
standard, not a proprietary protocol.
DNS
DHCP
SMTP
POP3
client-based
master-slave
point-to-point
peer-to-peer (P2P)
R1: S0/0/0
R2: S0/0/1
R1: G0/0
R2: S0/0/0
DHCP
ARP
DNS
ICMP
crosstalk
extended length of cabling
RFI
EMI
signal attenuation
20. A host is trying to send a packet to a device on a
remote LAN segment, but there are currently no
mappings in its ARP cache. How will the device obtain a
destination MAC address?
(A host is trying to send a packet to a device on a remote LAN
segment, but there are currently no mappings in the ARP
cache. How will the device obtain a destination MAC
address?)
It will send the frame and use its own MAC address as
the destination.
It will send an ARP request for the MAC address of the
destination device.
It will send the frame with a broadcast MAC address.
It will send a request to the DNS server for the
destination MAC address.
It will send an ARP request for the MAC address of
the default gateway.
DNS
NetBIOS (NetBT)
POP3
IMAP
23. A network administrator is adding a new LAN to a
branch office. The new LAN must support 25 connected
devices. What is the smallest network mask that the
network administrator can use for the new network?
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
Explanation:
The source port number of an application is randomly
generated and used to individually keep track of each
session connecting out to the Internet. Each application
will use a unique source port number to provide
simultaneous communication from multiple applications
through the Internet.
255.255.255.240
255.255.255.224
255.255.255.192
255.255.255.128
Explanation:
Network A needs to use 192.168.0.0 /25 which yields 128
host addresses.
Network B needs to use 192.168.0.128 /26 which yields
64 host addresses.
Network C needs to use 192.168.0.192 /27 which yields
32 host addresses.
Network D needs to use 192.168.0.224 /30 which yields
4 host addresses.
Explain:
The source and destination port numbers are used to
identify the correct application and window within that
application.
TCP
IP
UDP
POP
DNS
Ethernet
automation
accounting
authentication
authorization
message size
message encoding
connector specifications
media selection
delivery options
end-device installation
39. What are two characteristics of IP? (Choose two.)
does not require a dedicated end-to-end connection
operates independently of the network media
retransmits packets if errors occur
re-assembles out of order packets into the correct order
at the receiver end
guarantees delivery of packets
Explain:
The Internet Protocol (IP) is a connectionless, best effort
protocol. This means that IP requires no end-to-end
connection nor does it guarantee delivery of packets. IP
is also media independent, which means it operates
independently of the network media carrying the packets.
security
quality of service
scalability
powerline networking
integrity
fault tolerance
improper termination
low-quality shielding in cable
installing cables in conduit
low-quality cable or connectors
loss of light over long distances
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
Explain:
The output displays a successful Layer 3 connection
between a host computer and a host at 19.168.100.1. It
can be determined that 4 hops exist between them and
the average transmission time is 1 milliseconds. Layer 3
connectivity does not necessarily mean that an
application can run between the hosts.
application
network
data link
session
presentation
transport
255.255.255.128
255.255.255.240
255.255.255.248
255.255.255.224
51. What are two ICMPv6 messages that are not present
in ICMP for IPv4? (Choose two.)
Neighbor Solicitation
Destination Unreachable
Host Confirmation
Time Exceeded
Router Advertisement
Route Redirection
DHCP
SMTP
DNS
HTTP
53. What is an advantage for small organizations of
adopting IMAP instead of POP?
tracert
ipconfig
netstat
nslookup
Explain:
Traceroute (tracert) is a utility that generates a list of
hops that were successfully reached along the path from
source to destination.This list can provide important
verification and troubleshooting information. The ipconfig
utility is used to display the IP configuration settings on a
Windows PC. The Netstat utility is used to identify which
active TCP connections are open and running on a
networked host. Nslookup is a utility that allows the user
to manually query the name servers to resolve a given
host name. This utility can also be used to troubleshoot
name resolution issues and to verify the current status of
the name servers.
Other case:
Other case:
Other case:
Other case:
58. Match the type of threat with the cause. (Not all
options are used.)
ITN (Versión 7.00) – ITNv7 Final Exam
DoS
access
reconnaissance
Trojan horse
FTP
DHCP
Telnet
SSH
62. What are two problems that can be caused by a large
number of ARP request and reply messages? (Choose
two.)
Telnet
AUX
SSH
Console
67. What are the two most effective ways to defend
against malware? (Choose two.)
Implement a VPN.
Implement network firewalls.
Implement RAID.
Implement strong passwords.
Update the operating system and other application
software.
Install and update antivirus software.
brute-force attack
Trojan horse
DoS
buffer overflow
255.255.255.248
255.255.255.0
255.255.255.128
255.255.255.192
antispyware
virtual private networks
intrusion prevention systems
strong passwords
antivirus software
DNS
DHCP
SMTP
TFTP
Case 2:
Case 3:
Case 4:
subnet ID
subnet mask
broadcast address
global routing prefix
interface ID
extensive cabling
mobility options
packet collision
interference
security
coverage area
token passing
CSMA/CA
priority ordering
CSMA/CD
store-and-forward switching
borderless switching
ingress port buffering
cut-through switching
FEC0::/10
FDEE::/7
FE80::/10
FF00::/8
Explain:
Link-local addresses are in the range of FE80::/10 to
FEBF::/10. The original IPv6 specification defined site-
local addresses and used the prefix range FEC0::/10, but
these addresses were deprecated by the IETF in favor of
unique local addresses. FDEE::/7 is a unique local
address because it is in the range of FC00::/7 to
FDFF::/7. IPv6 multicast addresses have the prefix
FF00::/8.
DNS server
source port number
HTTP server
source MAC address
default gateway
0C6F:65FF:FEC2:BDF8
1E6F:65FF:FEC2:BDF8
C16F:65FF:FEC2:BDF8
106F:65FF:FEC2:BDF8
SW1 will send an ARP reply with the SW1 Fa0/1 MAC
address.
SW1 will send an ARP reply with the PC2 MAC address.
PC2 will send an ARP reply with the PC2 MAC
address.
RT1 will send an ARP reply with the RT1 Fa0/0 MAC
address.
RT1 will send an ARP reply with the PC2 MAC address.
cut-through
store-and-forward
fast-forward
fragment-free
Explain:
Peer-to-peer networks do not require the use of a
dedicated server, and devices can assume both client
and server roles simultaneously on a per request basis.
Because they do not require formalized accounts or
permissions, they are best used in limited situations.
Peer-to-peer applications require a user interface and
background service to be running, and can be used in
more diverse situations.
error detection
frame delimiting
accessing the media
data encapsulation
logical addressing
Explain:
Vlan1 is the default SVI. Because an SVI has been
configured, the switch can be configured and managed
remotely. FastEthernet0/0 is showing up and up, so a
device is connected.
99. Match each type of frame field to its function. (Not all
options are used.)
100. What is the subnet ID associated with the IPv6
address 2001:DA48:FC5:A4:3D1B::1/64?
2001:DA48::/64
2001:DA48:FC5::A4:/64
2001:DA48:FC5:A4::/64
2001::/64
101. Match the firewall function to the type of threat
protection it provides to the network. (Not all options are
used.)
packet filtering – prevents access based on IP or MAC
address
URL filtering – prevents access to websites
network address translator – (none)
stateful packet inspection – prevents unsolicited incoming
sessions
application filtering – prevents access by port number
255.255.255.192
255.255.255.252
255.255.255.240
255.255.255.248
255.255.255.0
255.255.255.224
255.255.255.240
255.255.255.0
255.255.255.248
255.255.255.224
IMAP
FTP
SSH
Telnet
Explain:
Both TCP and UDP use source and destination port
numbers to distinguish different data streams and to
forward the right data segments to the right applications.
Error checking the header and data is done by both
protocols by using a checksum calculation to determine
the integrity of the data that is received. TCP is
connection-oriented and uses a 3-way handshake to
establish an initial connection. TCP also uses window to
regulate the amount of traffic sent before receiving an
acknowledgment. UDP is connectionless and is the best
protocol for carry digitized VoIP signals.
FTP
LDAP
SLP
SNMP
255.255.255.192
255.255.255.248
255.255.255.224
255.255.255.240
Explain:
Using a /29 prefix to subnet 192.168.10.0 results in
subnets that increment by 8:
192.168.10.0 (1)
192.168.10.8 (2)
192.168.10.16 (3)
192.168.10.24 (4)
192.168.10.32 (5)
only host D
only router R1
only hosts A, B, and C
only hosts A, B, C, and D
only hosts B and C
only hosts B, C, and router R1
Explain:
Since host A does not have the MAC address of the
default gateway in its ARP table, host A sends an ARP
broadcast. The ARP broadcast would be sent to every
device on the local network. Hosts B, C, and router R1
would receive the broadcast. Router R1 would not
forward the message.
Explain:
Peer-to-peer networks do not require the use of a
dedicated server, and devices can assume both client
and server roles simultaneously on a per request basis.
Because they do not require formalized accounts or
permissions, they are best used in limited situations.
Peer-to-peer applications require a user interface and
background service to be running, and can be used in
more diverse situations.
88
200
72
224
158
122. Which connector is used with twisted-pair cabling in
an Ethernet LAN?
LC conector
SC conector
BNC
RJ 11
True Answer:
RJ 45 (true answer)
SSH
SMB/CIFS
HTTPS
SLP
i360201v3n1_275353.png
only host D
only hosts A, B, C, and D
only hosts B and C
only hosts B, C, and router R1
only hosts A, B, and C
only router R1
Bluetooth
Zigbee
WiMAX
Wi-Fi
neighbor solicitations
echo requests
neighbor advertisements
echo replies
router solicitations
router advertisements
256
512
1024
4096
255.255.255.0
255.255.255.240
255.255.255.128
255.255.255.192
255.255.255.224
DD:DD:DD:DD:DD:DD
172.168.10.99
CC:CC:CC:CC:CC:CC
172.168.10.65
BB:BB:BB:BB:BB:BB
AA:AA:AA:AA:AA:AA
Explain:
When a host sends information to a distant network, the
Layer 2 frame header will contain a source and
destination MAC address. The source address will be the
originating host device. The destination address will be
the router interface that connects to the same network. In
the case of host A sending information to host B, the
source address is AA:AA:AA:AA:AA:AA and the
destination address is the MAC address assigned to the
R2 Ethernet interface, BB:BB:BB:BB:BB:BB.
netstat -s
route print
show ip route
netstat -r
tracert
Explain:
On a Windows host, the route print or netstat -r
commands can be used to display the host routing table.
Both commands generate the same output. On a router,
the show ip route command is used to display the routing
table. The netstat –s command is used to display per-
protocol statistics. The tracert command is used to
display the path that a packet travels to its destination.
Explain:
A monopoly by one company is not a good idea from a
user point of view. If a protocol can only be run on one
brand, it makes it difficult to have mixed equipment in a
network. A proprietary protocol is not free to use. An
open standard protocol will in general be implemented by
a wide range of vendors.
255.255.255.0
255.255.255.240
255.255.255.248
255.255.255.252
Explain:
If the same mask is to be used, then the network with the
most hosts must be examined for number of hosts.
Because this is 10 hosts, 4 host bits are needed. The /28
or 255.255.255.240 subnet mask would be appropriate to
use for these networks.
IP addresses
interface descriptions
MAC addresses
next-hop addresses
Layer 1 statuses
speed and duplex settings
ping
nslookup
tracert
ipconfig /displaydns
Header Length
Differentiated Services
Time-to-Live
Fragment Offset
Explain:
When a router receives a traceroute packet, the value in
the TTL field is decremented by 1. When the value in the
field reaches zero, the receiving router will not forward
the packet, and will send an ICMP Time Exceeded
message back to the source.
virus
worm
phishing
spam
Subscribe
496 COMMENTS
Reply
Reply
still valid!!!
Reply
still valid?
Reply
Still valid!
Reply
47
A host is trying to send a packet to a device on a
remote LAN segment, but there are currently no
mappings in the ARP cache. How will the device
obtain a destination MAC address?
Reply
Can you please create the pdf for this question and
answers
Reply
Still valid?
Reply
Reply
Hi is it still valid?
Reply
Reply
still valid;
Reply
Thank you,
Reply
Reply
Reply
SW1 will send an ARP reply with the SW1 Fa0/1 MAC
address.PC2 will send an ARP reply with the PC2
MAC address.RT1 will send an ARP reply with the
RT1 Fa0/0 MAC address.SW1 will send an ARP reply
with the PC2 MAC address.RT1 will send an ARP
reply with the PC2 MAC address.
Reply
Hassan Hosny 7 months ago