You are on page 1of 50

ITN (Version 7.00 & v7.

02) – ITNv7 Final Exam synchronize communication between nodes


Answers 2023 2024 Full 100% ▪
Explanation & Hint:
1. A client packet is received by a server. The In the context of Ethernet communication, the MAC (Media Access Control) sublayer
packet has a destination port number of of the OSI Data Link Layer performs several crucial functions. Among these, the two
143. What service is the client requesting? functions that are most relevant to your query are:

o Telnet A. Places information in the Ethernet frame that identifies which network
o SSH layer protocol is being encapsulated by the frame: This function
o IMAP involves adding a type field to the Ethernet frame. This type field indicates
o FTP the network layer protocol that the frame is carrying, such as IPv4, IPv6,
Explanation & Hint: ARP, etc. This allows the receiving device to understand how to process
The client is requesting the IMAP (Internet Message Access Protocol) service. In TCP/IPthe encapsulated data.
networking, port numbers are used to distinguish different services. Port number B.143
Adds is Ethernet control information to network protocol data: This
specifically assigned to the IMAP service, which is used for retrieving emails from a involves
mail the encapsulation process where Ethernet-specific headers and
server. trailers are added to the network layer data. This Ethernet header includes
source and destination MAC addresses and other control information, while
This is different from the other services you mentioned: the trailer typically contains a Frame Check Sequence (FCS) for error
detection.
▪ Telnet, typically used for remote command-line access, uses port The23.
other options you mentioned, such as “handles communication between upper
▪ SSH (Secure Shell), used for secure remote access, uses port layer22. networking software and Ethernet NIC hardware” and “applies delimiting of
Ethernet
▪ FTP (File Transfer Protocol), used for transferring files, uses ports 20 andframe
21. fields to synchronize communication between nodes,” are not
2. Which two functions are performed at the specifically functions of the MAC sublayer in the context of Ethernet. The MAC
MAC sublayer of the OSI Data Link Layer to sublayer is more focused on frame formatting, addressing, and error checking. The
facilitate Ethernet communication? (Choose synchronization of communication is more of a function of the Physical layer. The
two.) —> Case A communication between upper layer networking software and Ethernet hardware is
o an overarching function of the entire Data Link layer and the network stack, not just
▪ handles communication the MAC sublayer.
between upper layer
networking software and o Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to
Ethernet NIC hardware facilitate Ethernet communication? (Choose two.) —> Case B
▪ places information in the ▪ adds Ethernet control information to network protocol data
Ethernet frame that ▪ integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet
identifies which network over copper
layer protocol is being ▪ handles communication between upper layer networking software and Ethernet NIC
encapsulated by the frame hardware
▪ implements trailer with ▪ implements CSMA/CD over legacy shared half-duplex media
frame check sequence for ▪ enables IPv4 and IPv6 to utilize the same physical medium
error detection ▪
▪ adds Ethernet control Explanation & Hint:
information to network or Ethernet communication, the MAC (Media Access Control) sublayer of the OSI
protocol data Data Link Layer primarily performs functions related to framing and addressing of
▪ applies delimiting of
Ethernet frame fields to
data packets. Based on the options provided, the two functionslayer protocol
performed atisthe
being encapsulated by the frame
MAC sublayer are: ▪ implements a process to delimit fields within an Ethernet 2 frame

A. Adds Ethernet control information to network protocol Explanation
data: This & Hint:
function involves the process of framing, where Ethernet In the contextand
headers of Ethernet communication within the MAC (Media Access Control)
trailers are added to network layer data. The Ethernetsublayer
header typically
of the OSI Data Link Layer, the two functions among those listed are:
includes source and destination MAC addresses, which are crucial for the
framing and addressing of packets on a network. The trailer A. usually
Implements trailer with frame check sequence for error detection: This
contains a Frame Check Sequence (FCS) for error detection. is a key function of the MAC sublayer. The Frame Check Sequence (FCS)
B. Implements CSMA/CD over legacy shared half-duplex media: is aCarrier
part of the Ethernet frame trailer used for error detection. It ensures the
Sense Multiple Access with Collision Detection (CSMA/CD) is aintegrity networkof data by enabling the receiving end to detect any corruption of
control protocol that was used in early Ethernet technology on shared,data thathalf-
might have occurred during transmission.
duplex channels. It is designed to minimize collisions by firstB.checking
Adds Ethernet
if the control information to network protocol data: This
channel is free before transmitting data. If a collision is detected, involves
it employs
the encapsulation process where the MAC sublayer adds
algorithms to reschedule the transmission. This function is a key Ethernet-specific
aspect of headers (and trailers, including the FCS mentioned
the MAC sublayer in managing access to the physical medium above) in traditional
to the data received from the network layer. This Ethernet header
Ethernet environments. typically includes source and destination MAC addresses and is essential
The other options, such as “integrates Layer 2 flows between 10 Gigabit for Ethernet
proper framing and addressing within an Ethernet network.
over fiber and 1 Gigabit Ethernet over copper,” and “enables IPv4 Theand
otherIPv6
options,
to utilize
such as “handles communication between upper layer networking
the same physical medium,” are more related to overall networksoftware design andand the
Ethernet NIC hardware” and “places information in the Ethernet frame
functionality of network devices rather than specific functions ofthatthe identifies which network layer protocol is being encapsulated by the frame,”
MAC sublayer.
Similarly, “handles communication between upper layer networking whilesoftware
relevant andto the overall functioning of Ethernet communication, are not
Ethernet NIC hardware” is more of a general description of the specifically
Data Link layer’s
functions
roleof the MAC sublayer. The MAC sublayer’s main focus is on
rather than a specific function of the MAC sublayer. addressing and framing of the data for Ethernet networks, along with error checking.
The delineation of fields within an Ethernet frame is part of the general framing
o Which two functions are performed process, but is not as distinctly a function as adding control information and
at the MAC sublayer of the OSI implementing error checking mechanisms.
Data Link Layer to facilitate
Ethernet communication? (Choose 3. A new network administrator has been asked to enter a banner message on a Cisco device. What is
two.) —> Case C the fastest way a network administrator could test whether the banner is properly configured?
▪ implements trailer with
frame check sequence for o Enter CTRL-Z at the privileged mode prompt.
error detection o Power cycle the device.
▪ handles communication o Exit privileged EXEC mode and press Enter.
between upper layer o Exit global configuration mode.
networking software and o Reboot the device.
Ethernet NIC hardware Answers Explanation & Hints:
▪ adds Ethernet control While at the privileged mode prompt such as Router#, type exit ,press Enter , and the
information to network banner message appears. Power cycling a network device that has had the banner
protocol data motd command issued will also display the banner message, but this is not a quick way
▪ places information in the to test the configuration.
Ethernet frame that
identifies which network
4. What happens when the transport input ssh command is entered on the switch vty lines?
o The switch requires a username/password combination for remote access.
o The SSH client on the switch is Explanation:
enabled. Stateless DHCPv6 or stateful DHCPv6 uses a DHCP server, but Stateless Address
o Communication between the switch Autoconfiguration (SLAAC) does not. A SLAAC client can automatically generate an
and remote users is encrypted. address that is based on information from local routers via Router Advertisement (RA)
o The switch requires remote messages. Once an address has been assigned to an interface via SLAAC, the client
connections via a proprietary client must ensure via Duplicate Address Detection (DAD) that the address is not already in
software. use. It does this by sending out an ICMPv6 Neighbor Solicitation message and listening
Answers Explanation & Hints: for a response. If a response is received, then it means that another device is already
The transport input ssh command when entered on the switch vty (virtual
using terminal lines)
this address.
will encrypt all inbound controlled telnet connections.
7. Which range of link-local addresses can be assigned to an IPv6-enabled interface?
5. What is the subnet ID associated with the
IPv6 address o FE80::/10
2001:DA48:FC5:A4:3D1B::1/64? o FDEE::/7
o FF00::/8
o 2001:DA48::/64 o FEC0::/10
o 2001::/64 Explanation:
o 2001:DA48:FC5:A4::/64 Link-local addresses are in the range of FE80::/10 to FEBF::/10. The original IPv6
o 2001:DA48:FC5::A4:/64 specification defined site-local addresses and used the prefix range FEC0::/10, but
Explanation: these addresses were deprecated by the IETF in favor of unique local addresses.
The /64 represents the network and subnet IPv6 fields. The fourth FDEE::/7
field ofishexadecimal
a unique local address because it is in the range of FC00::/7 to FDFF::/7.
digits is referred to as the subnet ID. The subnet ID for this address
IPv6 ismulticast addresses have the prefix FF00::/8.
2001:DA48:FC5:A4::0/64.
6. A client is using SLAAC to obtain an IPv6 8. What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a
address for its interface. After an address network?
has been generated and applied to the
interface, what must the client do before it o It checks the value of the TTL field and if it is 100, it discards the packet and sends a Destination
can begin to use this IPv6 address? Unreachable message to the source host.
o It increments the value of the TTL field by 1 and if the result is 100, it discards the packet and sends
o It must send an ICMPv6 Router a Parameter Problem message to the source host.
Solicitation message to determine o It checks the value of the TTL field and if it is 0, it discards the packet and sends a Destination
what default gateway it should use. Unreachable message to the source host.
o It must send a DHCPv6 o It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a
INFORMATION-REQUEST message Time Exceeded message to the source host.
to request the address of the DNS o
server. Explanation & Hint:
o It must send a DHCPv6 REQUEST The mechanism used by a router to prevent an IPv4 packet from traveling endlessly on
message to the DHCPv6 server to a network is based on the Time to Live (TTL) field in the IP header. The correct process
request permission to use this is:
address.
o It must send an ICMPv6 Neighbor It decrements the value of the TTL field by 1 and if the result is 0, it discards the
Solicitation message to ensure that packet and sends a Time Exceeded message to the source host.
the address is not already in use on
the network.
Here’s how it works:

▪ Each time an IPv4 packet passes through a router, the router reduces the TTL
value in the packet’s header by 1.
▪ If the TTL value reaches 0 (after being decremented), the router discards the
packet to prevent it from circulating indefinitely.
▪ When a packet is discarded due to TTL expiration, the router sends an ICMP
(Internet Control Message Protocol) Time Exceeded message back to the
source host, indicating that the packet was not delivered due to TTL expiration.
This mechanism is essential for preventing routing loops and ensuring efficient use of
network resources. The other options you mentioned do not accurately describe the
function and purpose of the TTL field in IP networking.
CCNA1 v7 – ITNv7 – Final Exam Answers 07
o The untwisted length of each wire is too long.
9. A network administrator is designing the o The woven copper braid should not have been removed.
layout of a new wireless network. Which o The wrong type of connector is being used.
three areas of concern should be accounted o The wires are too thick for the connector that is used.
for when building a wireless network?
Answers Explanation & Hints:
(Choose three.)
When a cable to an RJ-45 connector is terminated, it is important to ensure that the
untwisted wires are not too long and that the flexible plastic sheath surrounding the
o mobility options
wires is crimped down and not the bare wires. None of the colored wires should be
o security
visible from the bottom of the jack.
o interference
o coverage area
o packet collision 11. A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and
o extensive cabling distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and
Explanation: electrical equipment. Which two factors may interfere with the copper cabling and result in signal
The three areas of concern for wireless networks focusdistortion andofdata
on the size corruption?
the coverage (Choose two.)
area,
any nearby interference, and providing network security. Extensive cabling is not a
o EMI
concern for wireless networks, as a wireless network will require minimal cabling for
signal attenuation
providing wireless access to hosts. Mobility options are not oa component of the areas of
o crosstalk
concern for wireless networks.
o RFI
o extended length of cabling
10. Refer to the exhibit. What is wrong with
Explanation:
the displayed termination?
EMI and RFI signals can distort and corrupt data signals that are carried by copper
media. These distortions usually come from radio waves and electromagnetic devices
such as motors and florescent lights. Crosstalk is a disturbance that is caused by
adjacent wires bundled too close together with the magnetic field of one wire affecting
another. Signal attenuation is caused when an electrical signal begins to deteriorate
over the length of a copper cable.

12. Data is being sent from a source PC to a destination server. Which three statements correctly
describe the function of TCP or UDP in this situation? (Choose three.)
o TCP is the preferred protocol when a A. DHCP (Dynamic Host Configuration Protocol) – Typically uses UDP. DHCP is
function requires lower network used for dynamic IP addressing and operates on a simpler request/response
overhead. model which does not require the reliability and overhead of TCP.
o The source port field identifies the B. FTP (File Transfer Protocol) – Uses TCP. FTP requires reliable data transfer as
running application or service that will files are transmitted, so it uses TCP to ensure that all data reaches its destination
handle data returning to the PC. correctly.
o The TCP source port number C. HTTP (Hypertext Transfer Protocol) – Uses TCP. HTTP is used for web traffic
identifies the sending host on the which requires reliable transmission, thus TCP is used to ensure the complete and
network. accurate delivery of web pages.
o UDP segments are encapsulated D. SMTP (Simple Mail Transfer Protocol) – Uses TCP. SMTP is used for sending
within IP packets for transport across emails which requires reliability; hence, it uses TCP to ensure that email
the network. messages are reliably delivered to the recipient server.
o The UDP destination port number
14. A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing
identifies the application or service on
the connectivity, a technician finds that these PCs can access local network resources but not the
the server which will handle the data.
Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP
o The TCP process running on the PC
address and DNS configurations on the PCs, and also verify connectivity to the local router. Which
randomly selects the destination port
three Windows CLI commands and utilities will provide the necessary information? (Choose three.)
when establishing a session with the
server.
o netsh interface ipv6 show neighbor
Explanation: o arp -a
Layer 4 port numbers identify the application or service which
o will handle the data. The
tracert
source port number is added by the sending device and willobeping the destination port
number when the requested information is returned. Layer 4o segments
ipconfig are encapsulated
within IP packets. UDP, not TCP, is used when low overhead o is needed. A source IP
nslookup
address, not a TCP source port number, identifies the sending host on the network.
o telnet
Destination port numbers are specific ports that a server application or service monitors
Explanation:
for requests.
The ipconfig and nslookup commands will provide initial IP address and DNS
configuration information to the technicians and determine if DHCP is assigning correct
13. Match the application protocols to the information to the PCs. The ping utility would be used to verify, or not, connectivity to the
correct transport protocols. default gateway (router) using the configured default gateway address, or using the
known correct default gateway address if these are found to be different. The arp -a or
netsh interface ipv6 show neighbor commands could be used if the problem is then
suspected to be an IP address to MAC address mapping issue. The telnet and tracert
utilities could be used to determine where the problem was located in the network if the
default gateway configuration was found to be correct.

15. What two pieces of information are displayed in the output of the show ip interface
brief command? (Choose two.)

o speed and duplex settings


o MAC addresses
o next-hop addresses
Explanation & Hint: o interface descriptions
o IP addresses
o Layer 1 statuses o flow control field
Explanation: o User Datagram Protocol field
The command show ip interface brief shows the IP address frame
o of eachcheck sequence
interface, as well field
o
as the operational status of the interfaces at both Layer 1 and Layer 2. In order to see
interface descriptions and speed and duplex settings, use the command
Explanation show & Hint:
running-
config interface. Next-hop addresses are displayed in the routingThetable
framewith
fieldthe
created by a source node and used by a destination node to ensure that
command show ip route, and the MAC address of an interfaceacan transmitted
be seen datawith signal
the has not been altered by interference, distortion, or signal loss
command show interfaces. is the frame check sequence (FCS) field.
16. A network administrator is adding a new The FCS field contains a number that is calculated by the source node based on the
LAN to a branch office. The new LAN must data in the frame. This number is derived using a predetermined formula—typically a
support 25 connected devices. What is the cyclic redundancy check (CRC). The destination node performs the same calculation on
smallest network mask that the network the received data and compares the result to the value contained in the incoming
administrator can use for the new network? frame’s FCS field. If the numbers match, the frame is considered to be intact and free of
errors. If there is a discrepancy, it indicates that the data has been altered in transit, and
o 255.255.255.224 the frame is usually discarded.
o 255.255.255.192
o 255.255.255.240 18. What is a function of the data link layer?
o 255.255.255.128
o o provides delivery of data between two applications
Explanation & Hint: o provides for the exchange of frames over a common local media
To support 25 devices on a network, you need to have at leasto provides end-to-end
25 available IP delivery of data between hosts
addresses for the devices, plus one for the network addresso andprovides
one forthe
theformatting
broadcastof data
address. o
Explanation & Hint:
The subnet mask that can provide at least 27 addresses (25 forThe devices,
function
1 for
of the
the data link layer (Layer 2) in the OSI model is provides for the
network, and 1 for broadcast) is a /27 subnet mask. This is because:
exchange of frames over a common local media.
The data link layer is responsible for node-to-node delivery of data. It handles the
▪ A /27 subnet mask has 5 bits available for host addresses (32 – 27 = between
communication 5). adjacent network nodes within the same network segment or
local area network. It also manages how data packets are placed onto the physical
▪ With 5 bits, you can have 2525 or 32 possible combinations.
▪ Subtracting 2 for the network and broadcast addresses media
leaves
andyou
received
with 30from it, error detection and handling (via the Frame Check
usable IP addresses. Sequence), and sometimes error correction. Additionally, the data link layer defines the
The subnet mask 255.255.255.224 corresponds to a /27 subnetprotocol to establish
mask, which supports and terminate a connection between two physically connected
up to 30 usable IP addresses, which is sufficient for 25 devices.devices, as well as the protocol for controlling the flow of data between them.

So, the smallest network mask that the network administrator


19. Whatcan
are use
threeforcharacteristics
the new of the CSMA/CD process? (Choose three.)
network to support 25 connected devices is 255.255.255.224.
17. Which frame field is created by a source o After detecting a collision, hosts can attempt to resume transmission after a random time delay has
node and used by a destination node to expired.
ensure that a transmitted data signal has o A jam signal indicates that the collision has cleared and the media is not busy.
not been altered by interference, distortion, o All of the devices on a segment see data that passes on the network medium.
or signal loss? o The device with the electronic token is the only one that can transmit after a collision.
o Devices can be configured with a higher transmission priority.
o transport layer error check field o A device listens and waits until the media is not busy before transmitting.
o error correction process field o
Explanation & Hint: disrupt operations, gather sensitive information, or cause harm to the host system.
The Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Trojans are is an
a form
access
of malware and are distinct from other types of attacks or network
method used in Ethernet networks to control access to the network devices
medium.
becauseHerethey
arerequire an end user to install them, usually inadvertently, by
three characteristics of the CSMA/CD process: opening an email attachment or downloading them from the internet.
21. What three requirements are defined by the protocols used in network communcations to allow
A. After detecting a collision, hosts can attempt to resume
message transmission
transmission across a network? (Choose three.)
after a random time delay has expired. This is known as the backoff
algorithm, where each device waits for a random period of time before
o end-device installation
attempting to retransmit, reducing the probability of a collision on
o media selection
retransmission. o message encoding
B. All of the devices on a segment see data that passes on the
o delivery network
options
medium. In a CSMA/CD environment, when a device transmitsspecifications
o connector data, all other
devices on the same network segment can detectothat data because
message size they
share the same medium. o
C. A device listens and waits until the media is not busy before
Explanation & Hint:
transmitting. This is the ‘carrier sense’ part of CSMA/CD, where a device
Protocols in network communications are designed to ensure proper and efficient
checks to make sure the medium is free from traffic before it starts transmitting
transmission of data across a network. The following three are typical requirements
data.
defined by these protocols:
The other statements are not characteristics of the CSMA/CD process:
. Message encoding: This is the process of converting information into another
▪ A jam signal is used to notify all devices that a collision has occurred, not that it
form or code. In network communications, protocols define how a message is
has cleared.
formatted or converted into signals that are transmitted over the media. This
▪ There is no concept of electronic tokens in CSMA/CD; this is a characteristic of
can include encoding schemes such as binary, analog, or digital encoding,
another access method called Token Ring.
depending on the medium and technology in use.
▪ While devices may have different priority levels in some network
A. Delivery options: Protocols must define how messages are treated during the
configurations, CSMA/CD itself does not inherently support priority levels for
delivery process. This includes whether the communication is unicast,
transmission. Priority levels are a part of different network protocols, such as
multicast, or broadcast, as well as handling aspects like message prioritization,
those used in Quality of Service (QoS).
quality of service (QoS), and routing.
20. What characteristic describes a Trojan B. Message size: Protocols often define a maximum message size, which can be
horse? dictated by the Maximum Transmission Unit (MTU). The MTU is the largest
size of a packet or frame that can be sent in a packet- or frame-based network
o an attack that slows or crashes a such as the Internet. If a message exceeds the MTU, it must be divided into
device or network service smaller packets or frames, a process known as fragmentation.
o malicious software or code running on The other options provided, such as end-device installation, media selection, and
an end device connector specifications, are more related to the physical setup and hardware
o a network device that filters access requirements of the network rather than the protocols used for network communications.
and traffic coming into a network Protocols do dictate certain physical layer specifications but those are more about the
o the use of stolen credentials to electrical, optical, or mechanical aspects, and less about the actual selection and
access private data installation of media and devices.
o
Explanation & Hint: 22. What are two features of ARP? (Choose two.)
A Trojan horse is characterized as malicious software or code running on an end
device. It is often disguised as legitimate software, or is included
o If a within
devicelegitimate
receiving an ARP request has the destination IPv4 address, it responds with an ARP
software, and can be used by cyber attackers to gain unauthorized reply.access to systems,
o When a host is encapsulating a o The administrator is already in global configuration mode.
packet into a frame, it refers to the o The administrator must first enter privileged EXEC mode before issuing the command.
MAC address table to determine the Answers Explanation & Hints:
mapping of IP addresses to MAC In order to enter global configuration mode, the command configure terminal , or a
addresses. shortened version such as config t , must be entered from privileged EXEC mode. In this
o If no device responds to the ARP scenario the administrator is in user EXEC mode, as indicated by the > symbol after the
request, then the originating node will hostname. The administrator would need to use the enable command to move into
broadcast the data packet to all privileged EXEC mode before entering the configure terminal command.
devices on the network segment.
o An ARP request is sent to all devices
24. Refer to the exhibit. On the basis of the output, which two statements about network connectivity
on the Ethernet LAN and contains the
are correct? (Choose two.)
IP address of the destination host and
its multicast MAC address.
o If a host is ready to send a packet to
a local destination device and it has
the IP address but not the MAC
address of the destination, it
generates an ARP broadcast.
Explanation: CCNA1 v7 – ITNv7 – Final Exam Answers 05
o This host does not have a default gateway configured.
When a node encapsulates a data packet into a frame, it needs the destination MAC
o There are 4 hops between this device and the device at 192.168.100.1.
address. First it determines if the destination device is on the local network or on a
remote network. Then it checks the ARP table (not the MACo table) The average transmission
to see if a pair of IP time between the two hosts is 2 milliseconds.
o There is connectivity between this device and the device at 192.168.100.1.
address and MAC address exists for either the destination IP address (if the destination
o The connectivity between these two hosts allows for videoconferencing calls.
host is on the local network) or the default gateway IP address (if the destination host is
on a remote network). If the match does not exist, it generates an Explanation:
ARP broadcast to
The outputMAC
seek the IP address to MAC address resolution. Because the destination displays a successful Layer 3 connection between a host computer and a
address
is unknown, the ARP request is broadcast with the MAC address host at 19.168.100.1. It can be determined that 4 hops exist between them and the
FFFF.FFFF.FFFF.
Either the destination device or the default gateway will respond with its transmission
average MAC address, time is 1 milliseconds. Layer 3 connectivity does not necessarily
which enables the sending node to assemble the frame. If no device mean responds
that an application
to the can run between the hosts.
ARP request, then the originating node will discard the packet because a frame cannot
be created. 25. What are two characteristics of IP? (Choose two.)
23. Refer to the exhibit. An administrator is
trying to configure the switch but receives o retransmits packets if errors occur
the error message that is displayed in the o guarantees delivery of packets
exhibit. What is the problem? o does not require a dedicated end-to-end connection
o operates independently of the network media
o re-assembles out of order packets into the correct order at the receiver end
Explanation:
The Internet Protocol (IP) is a connectionless, best effort protocol. This means that IP
CCNA1 v7 – ITNv7 – Final Exam Answers 06 requires no end-to-end connection nor does it guarantee delivery of packets. IP is also
o The entire command, configure media independent, which means it operates independently of the network media
terminal , must be used. carrying the packets.
o The administrator must connect via
the console port to access global
configuration mode. 26. What will happen if the default gateway address is incorrectly configured on a host?
o The host cannot communicate with o automation
hosts in other networks. o authorization
o The host cannot communicate with o accounting
other hosts in the local network. o authentication
o A ping from the host to 127.0.0.1 Explanation:
would not be successful. After a user is successfully authenticated (logged into the server), the authorization is
o The switch will not forward packets the process of determining what network resources the user can access and what
initiated by the host. operations (such as read or edit) the user can perform.
o The host will have to use ARP to
determine the correct address of the
29. What are two common causes of signal degradation when using UTP cabling? (Choose two.)
default gateway.
Answers Explanation & Hints: o loss of light over long distances
When a host needs to send a message to another host located on the same
o low-quality network,
cable it
or connectors
can forward the message directly. However, when a host needs to send ashielding
o low-quality messageintocable
a
remote network, it must use the router, also known as the default gateway. This is
o installing cables in conduit
because the data link frame address of the remote destination host cannot
o improper be used
termination
directly. Instead, the IP packet has to be sent to the router (default
o gateway) and the
router will forward the packet toward its destination. Therefore, if the default gateway is
Explanation & Hint:
incorrectly configured, the host can communicate with other hosts on the same network,
Signal degradation, also known as attenuation, in UTP (Unshielded Twisted Pair)
but not with hosts on remote networks.
cabling can be caused by various factors. The two common causes from the options
provided are:
27. Users report that the network access is
slow. After questioning the employees, the . Low-quality cable or connectors: The use of inferior materials can result in
network administrator learned that one increased resistance and crosstalk between the wires inside the cable, which
employee downloaded a third-party can degrade the signal strength and quality as it travels along the cable.
scanning program for the printer. What type A. Improper termination: If the UTP cables are not terminated correctly, it can
of malware might be introduced that causes lead to reflections, crosstalk, and insertion loss. Proper termination is critical to
slow performance of the network? ensure that the signal integrity is maintained and that the connection is
reliable.
o spam The other options listed are not typically associated with UTP cable signal degradation:
o virus
o worm ▪ Loss of light over long distances applies to fiber optic cables, which transmit
o phishing light, not electrical signals as UTP does.
Explanation: ▪ Low-quality shielding in cable refers to shielded twisted pair (STP) rather
A cybersecurity specialist needs to be familiar with the characteristics of than
the different
UTP. UTP does not have shielding; its design relies on twisted pairs to
types of malware and attacks that threaten an organization. counteract electromagnetic interference.
28. A company has a file server that shares ▪ Installing cables in conduit does not inherently cause signal degradation;
a folder named Public. The network security however, if the conduit is overfilled or if the cables are bent at sharp angles, it
policy specifies that the Public folder is can potentially damage the cables and affect signal quality.
assigned Read-Only rights to anyone who 30. Which scenario describes a function provided by the transport layer?
can log into the server while the Edit rights
are assigned only to the network admin o A student has two web browser windows open in order to access two web sites. The transport layer
group. Which component is addressed in ensures the correct web page is delivered to the correct browser window.
the AAA network service framework?
o A student is using a classroom VoIP ▪ IP (Internet Protocol) – Operates at the internet layer and is responsible for
phone to call home. The unique routing packets across network boundaries.
identifier burned into the phone is a ▪ TCP (Transmission Control Protocol) and UDP (User Datagram
transport layer address used to Protocol) – Both operate at the transport layer and are responsible for
contact another network device on delivering data to the correct application protocols.
the same network. ▪ Ethernet – Operates at the link layer and is responsible for the transmission of
o A corporate worker is accessing a data frames over a physical medium.
web server located on a corporate
32. An employee of a large corporation remotely logs into the company using the appropriate
network. The transport layer formats
username and password. The employee is attending an important video conference with a customer
the screen so the web page appears
concerning a large sale. It is important for the video quality to be excellent during the meeting. The
properly no matter what device is
employee is unaware that after a successful login, the connection to the company ISP failed. The
being used to view the web site.
secondary connection, however, activated within seconds. The disruption was not noticed by the
o A student is playing a short web-
employee or other employees.
based movie with sound. The movie
What three network characteristics are described in this scenario? (Choose three.)
and sound are encoded within the
transport layer header.
o integrity
Explanation: o scalability
The source and destination port numbers are used to identify o the correct
quality application and
of service
window within that application. o fault tolerance
o powerline networking
31. Which two protocols operate at the top o security
layer of the TCP/IP protocol suite? (Choose o
two.) Explanation & Hint:
The scenario described indicates the following three network characteristics:
o POP
o DNS . Quality of Service (QoS) – The emphasis on the video quality being excellent
o IP during the meeting suggests that there is a mechanism in place to prioritize
o TCP video traffic over other types of traffic. Quality of Service is a set of
o Ethernet technologies used to manage network traffic in a way that ensures good
o UDP performance for critical applications, such as video conferencing.
o A. Fault Tolerance – The fact that the connection to the company ISP failed but
Explanation & Hint: a secondary connection activated within seconds, without any noticeable
The top layer of the TCP/IP protocol suite, commonly known as the applicationdisruption,
layer,
indicates
is a network design that accommodates for failures. This is
where protocols that facilitate user applications and end-to-end communications
referred to as fault tolerance, where systems are set up in a way that allows
operate. The two protocols from your list that operate at this layer are: them to continue operating properly in the event of the failure of some (non-
critical) components.
. POP (Post Office Protocol) – This is an application layer protocol used –byThe mention of the employee logging in with a username and
B. Security
local email clients to retrieve emails from a remote server over password
a TCP/IP indicates that there are security measures in place to control access
connection. to the network. This suggests that the network has security protocols to
A. DNS (Domain Name System) – This is also an application layer authenticate
protocol thatusers, which is a fundamental aspect of network security.
“Integrity” in a networking
translates human-readable domain names (like www.example.com) into context refers to the assurance that the data has not been
machine-readable IP addresses. altered during transmission, and while important, there is no specific mention of data
The other protocols listed operate at different layers of the TCP/IP
being
model:
altered or kept intact in this scenario.
“Scalability” refers to the network’s ability to grow and handle an increasing
MAC addressnumber
will be of
that of G0/0 on R1. When R1 gets that information, the router
clients or data traffic, and there is no information provided aboutremoves
the network’s growth
the Layer or
2 header and creates a new one for the type of network the data will
adaptability. be placed onto (the serial link).
34. Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose
“Powerline networking” is a type of network where electrical
three.) power lines are used to
transmit data, and there is no mention or implication of this technology being used in the
scenario provided. o transport
o application
33. Refer to the exhibit. If PC1 is sending a o network
packet to PC2 and routing has been o session
configured between the two routers, what o data link
will R1 do with the Ethernet frame header o presentation
attached by PC1? Explanation:
The TCP/IP model and OSI model perform similar functions. However, the TCP/IP
model uses four layers and the OSI model uses seven layers. The layers in each model
can be mapped to each other as follows:

OSI application -> TCP/IP application


OSI presentation -> TCP/IP application
OSI session -> TCP/IP application
OSI transport -> TCP/IP transport
OSI network -> TCP/IP internet
OSI data link -> TCP/IP network access
OSI physical -> TCP/IP network access

35. Match each description with an appropriate IP address. (Not all options are used.)

CCNA1 v7 – ITNv7 – Final Exam Answers 04


o open the header and use it to
determine whether the data is to be
sent out S0/0/0
o open the header and replace the
destination MAC address with a new
one
o nothing, because the router has a
route to the destination network
o remove the Ethernet header and
configure a new Layer 2 header
before sending it out S0/0/0
Explanation: CCNA1 v7 – ITNv7 – Modules 11 – 13 IP Addressing
When PC1 forms the various headers attached to theExam Answers
data one 006headers is the
of those
Explanation:
Layer 2 header. Because PC1 connects to an Ethernet network, an Ethernet header is
used. The source MAC address will be the MAC address of PC1 and the destination
Link-Local addresses are assigned automatically by the OS environmentTraffic
and are
flow
located
patterns
in should be gathered during peak utilization times to get a good
the block 169.254.0.0/16. The private addresses ranges are 10.0.0.0/8, 172.16.0.0/12,
representation and
of the different traffic types. The capture should also be performed on
192.168.0.0/16. TEST-NET addresses belong to the range 192.0.2.0/24.different
The addresses
networkinsegments because some traffic will be local to a particular segment.
the block 240.0.0.0 to 255.255.255.254 are reserved as experimental
38. addresses.
Refer Loopback
to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students.
addresses belong to the block 127.0.0.0/8. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to
the router?
36. What does the term “attenuation” mean
in data communication?

o strengthening of a signal by a
networking device
o leakage of signals from one cable pair
to another
o loss of signal strength as distance
increases CCNA1 v7 – ITNv7 – Final Exam Answers 03
o time for a signal to reach its o Layer 2 destination address = 00-00-0c-94-36-dd
destination Layer 2 source address = 00-00-0c-94-36-bb
Layer 3 destination address = 172.16.20.200
Answers Explanation & Hints:
Layer 3 source address = 172.16.10.200
Data is transmitted on copper cables as electrical pulses. A detector in the network
o Layer 2 destination address = 00-00-0c-94-36-ab
interface of a destination device must receive a signal that can be successfully decoded
Layer 2 source address = 00-00-0c-94-36-bb
to match the signal sent. However, the farther the signal travels, the more it deteriorates.
Layer 3 destination address = 172.16.20.200
This is referred to as signal attenuation.
Layer 3 source address = 172.16.100.200
o Layer 2 destination address = 00-00-0c-94-36-ab
37. Which two statements describe how to Layer 2 source address = 00-00-0c-94-36-bb
assess traffic flow patterns and network Layer 3 destination address = 172.16.20.200
traffic types using a protocol analyzer? Layer 3 source address = 172.16.10.200
(Choose two.) o Layer 2 destination address = 00-00-0c-94-36-cd
Layer 2 source address = 00-00-0c-94-36-bb
o Capture traffic during peak utilization Layer 3 destination address = 172.16.20.99
times to get a good representation of Layer 3 source address = 172.16.10.200
the different traffic types. o
o Perform the capture on different
Explanation & Hint:
network segments. Based on the network diagram provided, when Host B in the subnet Teachers sends a
o Only capture WAN traffic because
packet to Host D in the subnet Students, the Layer 2 and Layer 3 addresses contained
traffic to the web is responsible for the in the Protocol Data Units (PDUs) transmitted from Host B to the router would be:
largest amount of traffic on a network.
o Only capture traffic in the areas of the
Layer 3 (Network Layer):
network that receive most of the ▪ Layer 3 Source Address: This would be Host B’s IP address, which
traffic such as the data center. is 172.16.10.200.
o Capture traffic on the weekends when
▪ Layer 3 Destination Address: This would be Host D’s IP address, which
most employees are off work. is 172.16.20.200.
Explanation: Layer 2 (Data Link Layer):
▪ Layer 2 Source Address: This would be Host B’s MAC o Alladdress,
ARP request
whichmessages
is 00- must be processed by all nodes on the local network.
00-0c-94-36-bb. o The network may become overloaded because ARP reply messages have a very large payload due
▪ Layer 2 Destination Address: This would be the MACtoaddress
the 48-bit MAC
of the address and 32-bit IP address that they contain.
router’s
o
interface on the Teachers subnet, which is 00-00-0c-94-36-ab.
The data packet would be framed with these addresses when Host Explanation
B transmits
& Hint:
to the
router because the destination host (Host D) is on a different subnet,
A largesonumber
the packet
of ARP (Address Resolution Protocol) request and reply messages can
needs to be directed to the router’s interface that Host B is connected to.
cause several issues on a network. The two problems from the given options are:

The correct addresses for the packet transmission from Host B to the router
. Thebased
ARP request
on is sent as a broadcast, and will flood the entire
the provided exhibit would be: subnet. ARP requests are broadcasted to all hosts on the local network
segment because the source needs to discover the MAC address associated
▪ Layer 2 destination address = 00-00-0c-94-36-ab with a known IP address. If there is a large number of ARP requests, this can
▪ Layer 2 source address = 00-00-0c-94-36-bb lead to a significant amount of broadcast traffic, which can consume a lot of the
▪ Layer 3 destination address = 172.16.20.200 available bandwidth and processing power of the devices on the subnet.
▪ Layer 3 source address = 172.16.10.200 A. All ARP request messages must be processed by all nodes on the local
39. Which subnet would include the address network. Since ARP requests are broadcasted, every node on the local
192.168.1.96 as a usable host address? network must process these requests to check if they hold the IP address for
which the MAC address is being queried. This can lead to unnecessary
o 192.168.1.32/27 processing on each host, which can be particularly problematic on large
o 192.168.1.32/28 networks or when a host is receiving more ARP requests than it can handle
o 192.168.1.64/29 efficiently.
o 192.168.1.64/26 The other statements either describe scenarios that are not directly related to ARP traffic
or are not accurate:
Explanation:
For the subnet of 192.168.1.64/26, there are 6 bits for host addresses, yielding 64
▪ Switches do not become overloaded due to ARP traffic specifically; they
possible addresses. However, the first and last subnets are the network and broadcast
become overloaded if they have to process more traffic than they are designed
addresses for this subnet. Therefore, the range of host addresses for this subnet is
to handle, whether it’s ARP traffic or other types.
192.168.1.65 to 192.168.1.126. The other subnets do not contain the address
▪ ARP messages do not have a very large payload; they are relatively small. The
192.168.1.96 as a valid host address.
size of the ARP message is not typically a factor in network overload. The
concern with ARP is the number of requests and their broadcast nature, not
40. What are two problems that can be the size of the packets.
caused by a large number of ARP request
41. Why would a Layer 2 switch need an IP address?
and reply messages? (Choose two.)
o to enable the switch to be managed remotely
o A large number of ARP request and
o to enable the switch to receive frames from attached PCs
reply messages may slow down the
o to enable the switch to send broadcast frames to attached PCs
switching process, leading the switch
o to enable the switch to function as a default gateway
to make many changes in its MAC
table. Answers Explanation & Hints:
o The ARP request is sent as a A switch, as a Layer 2 device, does not need an IP address to transmit frames to
broadcast, and will flood the entire attached devices. However, when a switch is accessed remotely through the network, it
subnet. must have a Layer 3 address. The IP address must be applied to a virtual interface
o Switches become overloaded rather than to a physical interface. Routers, not switches, function as default gateways.
because they concentrate all the
traffic from the attached subnets.
42. How does the service password- 44. Which two statements accurately describe an advantage or a disadvantage when deploying NAT
encryption command enhance password for IPv4 in a network? (Choose two.)
security on Cisco routers and switches?
o NAT will impact negatively on switch performance.
oIt requires encrypted passwords to be o NAT causes routing tables to include more information.
used when connecting remotely to a NAT improves packet handling.
o
router or switch with Telnet. NAT adds authentication capability to IPv4.
o
o It encrypts passwords that are stored NAT provides a solution to slow down the IPv4 address depletion.
o
in router or switch configuration files. NAT introduces problems for some applications that require end-to-end connectivity.
o
o It requires that a user type encrypted o
passwords to gain console access to Explanation & Hint:
a router or switch. When deploying Network Address Translation (NAT) for IPv4 in a network, the following
o It encrypts passwords as they are two statements accurately describe an advantage or a disadvantage:
sent across the network.
Explanation: . NAT provides a solution to slow down the IPv4 address depletion. NAT
The service password-encryption command encrypts plaintext passwords allows
in the
multiple devices on a private network to share a single public IPv4
configuration file so that they cannot be viewed by unauthorized users. address for accessing external networks, such as the internet. This helps to
43. Which two statements are correct in a mitigate the problem of IPv4 address exhaustion by reducing the number of
comparison of IPv4 and IPv6 packet public addresses that an organization needs.
headers? (Choose two.) A. NAT introduces problems for some applications that require end-to-end
connectivity. Some applications, particularly those that require the initiation of
o The Destination Address field is new connections from the external network to the internal network or use IP
in IPv6. address information embedded within the application layer data, can have
o The Source Address field name from issues operating over NAT. This is because NAT modifies the IP address
IPv4 is kept in IPv6. information in packets, which can disrupt the direct communication path that
o The Version field from IPv4 is not these applications rely on.
kept in IPv6. The other statements are either not advantages/disadvantages of NAT or are incorrect:
o The Time-to-Live field from IPv4 has
been replaced by the Hop Limit field ▪ NAT will impact negatively on switch performance. NAT is typically
in IPv6. performed by routers or firewalls, not switches. It does not directly affect switch
o The Header Checksum field name performance.
from IPv4 is kept in IPv6. ▪ NAT causes routing tables to include more information. NAT does not
directly affect the size of routing tables. Routing tables are concerned with the
Explanation & Hint:
destination IP addresses and do not need to store information about translated
The IPv6 packet header fields are as follows: Version, Traffic Class, Flow Label,
addresses.
Payload Length, Next Header, Hop Limit, Source Address, and Destination Address.
▪ NAT improves packet handling. While NAT can help manage the IP address
The IPv4 packet header fields include the following: Version, Differentiated Services,
space, it does not inherently improve how packets are handled beyond the
Time-to-Live, Protocol, Source IP Address, and Destination IP Address. Both versions
address translation function.
have a 4-bit Version field. Both versions have a Source (IP) Address field. IPv4
▪ NAT adds authentication capability to IPv4. NAT does not provide
addresses are 32 bits; IPv6 addresses are 128 bits. The Time-to-Live or TTL field in
authentication capabilities; it merely translates IP addresses from private to
IPv4 is now called Hop Limit in IPv6, but this field serves the same purpose in both
public and vice versa. Authentication is a separate function that is not provided
versions. The value in this 8-bit field decrements each time a packet passes through any
by NAT itself.
router. When this value is 0, the packet is discarded and is not forwarded to any other
router. 45. Match each item to the type of topology diagram on which it is typically identified. (Not all options
are used.)
o Telnet
o FTP
o SSH
o DHCP
o
Explanation & Hint:
The client is requesting DHCP (Dynamic Host Configuration Protocol) service. In the
context of networking, port numbers are used to identify specific services or protocols.
Port number 67 is the port designated for the server side of the DHCP service. DHCP
CCNA1 v7 Final Exam Answers 003 clients use port 68.
Explanation:
A logical topology diagram typically depicts the IP addressing scheme and groupings
Here’s a briefofoverview of the services and their default ports for context:
devices and ports. A physical topology diagram shows how those devices are connected to
each other and the network, focusing on the physical locations of intermediary devices,
▪ Telnet uses port 23.
configured ports, and cabling. ▪ FTP (File Transfer Protocol) has two ports, 20 for data transfer and 21 for
control (command).
46. What service is provided by HTTP? ▪ SSH (Secure Shell) uses port 22.
▪ DHCP (Dynamic Host Configuration Protocol) server listens on port 67, and
o An application that allows real-time the DHCP client listens on port 68.
chatting among remote users. 48. What are the two most effective ways to defend against malware? (Choose two.)
o Uses encryption to secure the
exchange of text, graphic images, o Implement strong passwords.
sound, and video on the web. o Update the operating system and other application software.
o Allows for data transfers between a o Install and update antivirus software.
client and a file server. o Implement RAID.
o A basic set of rules for exchanging o Implement a VPN.
text, graphic images, sound, video, o Implement network firewalls.
and other multimedia files on the web. Explanation:
o
A cybersecurity specialist must be aware of the technologies and measures that are
Explanation & Hint: used as countermeasures to protect the organization from threats and vulnerabilities.
The service provided by HTTP (Hypertext Transfer Protocol) is:
49. An administrator defined a local user account with a secret password on router R1 for use with
SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH
A basic set of rules for exchanging text, graphic images, sound, video, and other
connections? (Choose three.)
multimedia files on the web.
HTTP is the protocol used for transmitting web pages over the internet, allowing users to
o Configure the IP domain name on the router.
view and navigate web pages. It does not inherently include encryption; that service is
o Enable inbound vty Telnet sessions.
provided by HTTPS (HTTP Secure), which is HTTP over SSL/TLS. HTTP itself is not an
o Configure DNS on the router.
application for chatting nor specifically for file transfers between a client and a server,
o Generate the SSH keys.
although it can be used to download or upload files within the context of web services.
o Generate two-way pre-shared keys.
o Enable inbound vty SSH sessions.
47. A client packet is received by a server. Explanation:
The packet has a destination port number of There are four steps to configure SSH support on a Cisco router:
67. What service is the client requesting? Step 1: Set the domain name.
Step 2: Generate one-way secret keys.
Step 3: Create a local username and password.
Step 4: Enable SSH inbound on a vty line.

50. A host is trying to send a packet to a


device on a remote LAN segment, but there
are currently no mappings in its ARP cache.
How will the device obtain a destination
MAC address?

o It will send the frame and use its own


MAC address as the destination.
o It will send the frame with a broadcast
MAC address.
o It will send an ARP request for the
MAC address of the destination
device.
o It will send a request to the DNS
server for the destination MAC
address. CCNA1 v7 – ITNv7 – Final Exam Answers 03
o It will send an ARP request for the Explanation & Hint:
MAC address of the default gateway. In the OSI model, different layers have specific functions and responsibilities, and certain
o fields in network protocol headers are associated with these layers:
Explanation & Hint:
When a host needs to send a packet to a device on aLayer
remote2:LAN
Datasegment
Link Layer
and has no
ARP cache entry for the destination’s MAC address, it will: o 802.2 header: This refers to the IEEE 802.2 standard for logical link control (LLC)
which is part of the Data Link Layer. It provides addressing and control of the data
Send an ARP request for the MAC address of the default gateway. link. It encapsulates the network layer protocol information.
Here’s why: for remote destinations (those not on the same local
o FCS (Framethe
network), host Sequence): The FCS is used for error detection. It’s a part of
Check
knows that it must send the packet through a router (commonlythe thetrailer in gateway).
default the Ethernet frame, which is a Layer 2 PDU (Protocol Data Unit). It
Since the host doesn’t have the MAC address for the gateway in its ARP
allows the cache, it will
receiving node to detect if the frame was damaged in transit.
o Destination
send an ARP request to resolve the MAC address of the default gateway. Once MACit Address:
has The MAC address is a hardware address that
identifies each
the MAC address of the default gateway, it will send the packet to the gateway for device on a local network uniquely. It is used by switches to
further routing to the remote destination. forward frames to the correct destination on a local network, which is a Layer 2
activity.
51. Match the header field with the Layer 3: Network Layer
o TTL (Time To Live): The TTL field in an IP packet header helps prevent
appropriate layer of the OSI model. (Not all
options are used.) datagrams from looping indefinitely on an IP network. Each router that forwards a
packet decrements the TTL by one. If the TTL reaches zero, the packet is
discarded. This is a Layer 3 function because it deals with the lifespan of a packet
as it travels across networks.
o Source IP Address: This is the IP address of the device that originally sends the
packet. The Network Layer (Layer 3) is responsible for the logical IP addressing
and for routing packets across different networks.
Layer 4: Transport Layer o protocols that can be freely used by any organization or vendor
o Acknowledgment Number: In TCP (Transmission Control oProtocol), protocols developed by private organizations to operate on any vendor hardware
which
a collection
operates at Layer 4, the acknowledgment number is used too confirm of of
receipt protocols known as the TCP/IP protocol suite
packets. TCP is a connection-oriented protocol, and the acknowledgment number by organizations who have control over their definition and operation
o protocols developed
is a key feature that supports reliable transmission. Explanation:
o Destination Port Number: The port number is used to identify Proprietary
specific protocols have their definition and operation controlled by one company or
applications/services on a host. For example, web servers usually vendor.
use port
Some80offorthem can be used by different organizations with permission from the
HTTP. This is managed by the Transport Layer (Layer 4), whichowner. is responsible
The TCP/IPfor protocol suite is an open standard, not a proprietary protocol.
end-to-end communication and reliability.
These fields are integral to the operation of their respective54.
layers,What
ensuring
is anthat data is to using a protocol that is defined by an open standard?
advantage
encapsulated, routed, and received accurately and reliably.
o An open standard protocol is not controlled or regulated by standards organizations.
52. When a switch configuration includes a o A company can monopolize the market.
user-defined error threshold on a per-port o It encourages competition and promotes choices.
basis, to which switching method will the o The protocol can only be run on equipment from a specific vendor.
switch revert when the error threshold is Explanation:
reached? A monopoly by one company is not a good idea from a user point of view. If a protocol
can only be run on one brand, it makes it difficult to have mixed equipment in a network.
o fast-forward A proprietary protocol is not free to use. An open standard protocol will in general be
o cut-through implemented by a wide range of vendors.
o store-and-forward
o fragment-free
55. Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide
o
services?
Explanation & Hint:
When a switch configuration includes a user-defined error threshold
o email on a per-port basis,
and this threshold is reached, the switch will revert to the store-and-forward
o file switching
method. o web
Store-and-forward switching reads the entire frame into theoswitch’s
DNS buffer and checks it
for errors (using the Frame Check Sequence, FCS) before forwarding it on to its
Explanation:
destination. This method ensures that the frame is error-free, which is particularly useful
A DNS server stores records that are used to resolve IP addresses to host names.
when the network experiences a high level of errors. If a frame does not pass the FCS
Some DNS record types include the following:
check, the switch discards it rather than forwarding it.
▪ A – an end device IPv4 address
Other switching methods like cut-through and fragment-free begin forwarding the frame
▪ NS – an authoritative name server
before it’s entirely received, which is faster but doesn’t allow for thorough error checking.
▪ AAAA – an end device IPv6 address
Fast-forward is a type of cut-through switching that forwards the frame as soon as the
▪ MX – a mail exchange record
destination MAC address is read, without waiting for error checking. Fragment-free is
another form of cut-through switching that waits for 56. Match awindow
the collision statement to theto
(64 bytes) related network model. (Not all options are used.)
pass before forwarding to minimize the chance of collision-related errors. When an error
threshold is set and reached, these methods would not be suitable since they do not
provide comprehensive error checking like store-and-forward does.

53. What are proprietary protocols?


58. Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range
of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a
new building, the technician has decided to use the fifth subnet for configuring the new network
(subnet zero is the first subnet). By company policies, the router interface is always assigned the first
usable host address and the workgroup server is given the last usable host address. Which
configuration should be entered into the properties of the workgroup server to allow connectivity to
the Internet?

ITN Chapter 10 Exam Answers 02


Explanation:
Peer-to-peer networks do not require the use of a dedicated server, and devices can
assume both client and server roles simultaneously on a per request basis. Because they
do not require formalized accounts or permissions, they are best used in limited situations.
Peer-to-peer applications require a user interface and background service to be running,
and can be used in more diverse situations.

57. A network administrator wants to have CCNA1 v7 – ITNv7 – Final Exam Answers 02
the same network mask for all networks at a o IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33
particular small site. The site has the o IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33
following networks and number of devices: o IP address: 192.168.10.254 subnet mask: 255.255.255.0, default gateway: 192.168.10.1
o IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46
IP phones – 22 addresses o IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76
PCs – 20 addresses needed Explanation:
Printers – 2 addresses needed Using a /29 prefix to subnet 192.168.10.0 results in subnets that increment by 8:
Scanners – 2 addresses needed 192.168.10.0 (1)
The network administrator has deemed that 192.168.10.8 (2)
192.168.10.0/24 is to be the network used at 192.168.10.16 (3)
this site. Which single subnet mask would 192.168.10.24 (4)
make the most efficient use of the available 192.168.10.32 (5)
addresses to use for the four subnetworks?
o 255.255.255.240 59. Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a
o 255.255.255.0 subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host
o 255.255.255.192 addresses are unused across all four subnets?
o 255.255.255.224
o 255.255.255.248
o 255.255.255.252
Explanation:
If the same mask is to be used, then the network with the most hosts must be examined
for the number of hosts, which in this case is 22 hosts. Thus, 5 host bits are needed.
The /27 or 255.255.255.224 subnet mask would be appropriate to use for these
networks.
B. Invert the 7th bit of the first byte (counting from left, where the least significant
bit is bit 1). The 7th bit of 1C (in binary: 0001 1100) is 0. Flipping it gives 0010
1100, which is 2C in hexadecimal.
C. Write the result in IPv6 format, grouping the hex digits into four blocks
separated by colons.
Therefore, the IPv6 interface ID using the EUI-64 process for the MAC address 1C-6F-
65-C2-BD-F8 is 2C6F:65FF:FEC2:BDF8.
However, none of the options provided exactly match this correct transformation. The
closest option (which may be a typo or an error in the options given) is:

1E6F:65FF:FEC2:BDF8
But based on standard EUI-64 conversion rules, the correct answer should
CCNA1 v7 – ITNv7 – Final Exam Answers 01 be 2C6F:65FF:FEC2:BDF8. If this is an exam or a quiz, it might be worth reviewing the
o 158 options provided or checking if there might be a mistake in the question.
o 200 61. Which information does the show startup-config command display?
o 224 o the IOS image copied into RAM
o 88 o the bootstrap program in the ROM
o 72 o the contents of the saved configuration file in the NVRAM
Explanation: o the contents of the current running configuration file in the RAM
The network IP address 192.168.99.0 and a subnet mask ofo 255.255.255.192 provides
62 usable IP addresses for each subnet. Subnet A needs 30 host addresses.&There
Explanation Hint: are
32 addresses wasted. Subnet B uses 2 of the 62 available IP addresses, because it is acommand displays the contents of the saved configuration
The show startup-config
serial link. Consequently, it wastes 60 addresses. Likewise, subnet C the
file in wastes 60 When you run this command on a Cisco device, it shows you the
NVRAM.
addresses. Subnet D needs 14 addresses, so it wastes 48 addresses. The total
configuration thatwasted
will be used the next time the device is restarted. This is the
addresses are 32+60+60+48=200 addresses. configuration that has been saved using the copy running-config startup-
60. What would be the interface ID of an config command.
IPv6 enabled interface with a MAC address It does not display the IOS image, the bootstrap program, or the current running
of 1C-6F-65-C2-BD-F8 when the interface ID configuration, which are all different components of the device’s operation. The IOS
is generated by using the EUI-64 process? image is the operating system file, the bootstrap program is the initial code that runs
when the device is powered on, and the current running configuration is the active
o 1E6F:65FF:FEC2:BDF8 configuration that the device is currently using (which can be viewed using the show
o C16F:65FF:FEC2:BDF8 running-config command).
o 0C6F:65FF:FEC2:BDF8 62. Match each type of frame field to its function. (Not all options are used.)
o 106F:65FF:FEC2:BDF8
o
Explanation & Hint:
The EUI-64 process for generating an IPv6 interface ID from a MAC address involves
several steps. Here’s how you would do it:

. Split the MAC address in half: 1C-6F-65 and C2-BD-F8.


A. Insert FF-FE in the middle: 1C-6F-65-FF-FE-C2-BD-F8.
Explanation & Hint:
The two primary responsibilities of the Ethernet MAC sublayer based on the options
provided are:

. Accessing the media: This involves controlling how a network device


physically places an Ethernet frame onto the network medium. Ethernet
networks can have multiple devices trying to use the same medium (like
twisted pair cable, fiber optic, etc.), so there needs to be a method for
preventing collisions and managing what happens if they occur. The MAC
sublayer uses Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) for this purpose in traditional Ethernet networks. The device
listens to the medium to check if it is idle before sending data. If two devices
transmit at the same time and a collision is detected, CSMA/CD dictates how
the devices handle the collision and when they can attempt to resend the data.
A. Data encapsulation: In the context of the MAC sublayer, this involves creating
the Ethernet frame structure that encapsulates the network layer data. This
encapsulation includes adding a header and a trailer to the data packet. The
header contains the source and destination MAC addresses, and the
type/length field, which is used to identify the payload type or the length of the
CCNA1 v7 Final Exam Answers 004 payload. The trailer contains a Frame Check Sequence (FCS), which is used
for error detection. The encapsulation ensures that the payload is delivered
Explanation & Hint:
correctly from one MAC address to another and can be checked for errors
. Addressing: This field is responsible for directing the frame toward its destination.
upon arrival.
In an Ethernet frame, this would correspond to both the source and destination
While the MAC sublayer is directly responsible for placing the frame onto the medium,
MAC addresses.
the overall process of data encapsulation includes other sublayers/functions as well. The
A. Error detection: This field checks if the frame has been damaged during the
LLC sublayer, for example, can add control information to help deliver the packet to the
transfer. This corresponds to the Frame Check Sequence (FCS) at the end of an
correct network protocol (IPv4, IPv6, ARP, etc.) once it reaches the destination.
Ethernet frame.
However, in the context of Ethernet and your options, encapsulation refers to the
B. Type: This field is used by the Logical Link Control (LLC) to identify the Layer 3
addition of Ethernet-specific framing around the network payload.
protocol, such as IP. It can indicate what type of payload the frame is carrying.
C. Frame start: This field identifies the beginning of a frame. In Ethernet frames, this
64.(SFD).
is typically the preamble or the start frame delimiter Match the characteristic to the forwarding method. (Not all options are used.)
Flow control services are typically managed at higher layers (like the transport layer in TCP
with flow control mechanisms) and not indicated by a specific field in the Ethernet frame
structure.

63. What are two primary responsibilities of


the Ethernet MAC sublayer? (Choose two.)

o accessing the media


o data encapsulation
o logical addressing
o error detection
o frame delimiting
o
check, it indicates that the frame has errors, and the switch discards it to prevent
the propagation of corrupt data.
65. Which switching method drops frames that fail the FCS check?

o store-and-forward switching
o ingress port buffering
o cut-through switching
o borderless switching
o
Explanation & Hint:
The switching method that drops frames that fail the FCS (Frame Check Sequence)
check is store-and-forward switching.
In store-and-forward switching, the switch accepts the entire frame into its buffer, checks
the FCS for errors, and only forwards the frame if no errors are detected. If the FCS
check fails, indicating that there are errors in the frame, the switch drops the frame. This
method ensures that corrupt frames are not propagated through the network.
CCNA1 v7 Final Exam Answers 005
Explanation & Hint: The other methods listed have different characteristics:
Cut-Through Switching:
o Begins forwarding when the destination address is received: This Ingress port buffering refers to the practice of using buffers on the switch’s
▪ mode
starts to forward the frame as soon as the switch reads the destination MAC ports to hold incoming frames before processing, which can help manage
congestion but isn’t directly related to FCS checking.
address. It does not wait for the entire frame to arrive before it begins forwarding
it. ▪ Cut-through switching begins forwarding the frame as soon as the
o Has low latency: Because cut-through switches start forwarding frames destination
before MAC address is read, without waiting for the entire frame to come
they are completely received, there is less processing time, and thus, lower in, and thus it does not typically check the FCS before forwarding. Some
latency. advanced cut-through switches may have mechanisms to check FCS after
o May forward runt frames: Since cut-through switches do not wait for the entire
they have started forwarding the frame and stop forwarding if an error is
frame to arrive and do not check the frame’s integrity before forwarding, they may
detected.
forward frames that are smaller than the minimum legal frame size, known as runt switching is a marketing term used by some vendors to describe
▪ Borderless
frames. switches designed for modern networking needs, providing integrated security,
mobility, and application optimization across a network without borders. It is
not specific to a method of error checking or frame forwarding.
Store-and-Forward Switching: 66. What is an advantage for small organizations of adopting IMAP instead of POP?
o Always stores the entire frame: The switch receives the whole frame and
buffers it completely before making any decisions on forwarding. This allows the
o IMAP sends and retrieves email, but POP only retrieves email.
switch to look at the entire frame from start to finish. o POP only allows the client to store messages in a centralized way, while IMAP allows distributed
o Checks the frame length before forwarding: While the frame is in the buffer,
storage.
the switch checks to ensure that it is not below the minimumo frame size are kept in the mail servers until they are manually deleted from the email client.
Messages
(undersized, which would make it a runt frame) or above theo maximum
When theframe size
user connects to a POP server, copies of the messages are kept in the mail server for a
(oversized, which would make it a giant frame). Frames that don’t meet the correct
short time, but IMAP keeps them for a long time.
specifications are discarded.
Explanation:
o Checks the CRC before forwarding: The switch also performs an integrity check
on the frame using the Cyclic Redundancy Check (CRC). If theIMAP frameand
failsPOP
this are protocols that are used to retrieve email messages. The advantage
of using IMAP instead of POP is that when the user connects to an IMAP-capable
server, copies of the messages are downloaded to the client application.
▪ AIMAP
/27 subnet
then mask (255.255.255.224)
stores the email messages on the server until the user manually deletes provides
those 2(32−27)−2=302(32−27)−2=30 usable host addresses, which is not
messages. enough.
67. A wired laser printer is attached to a ▪ A /28 subnet mask (255.255.255.240)
home computer. That printer has been provides 2(32−28)−2=142(32−28)−2=14 usable host addresses, which is also
shared so that other computers on the not enough.
home network can also use the printer. ▪ A /26 subnet mask (255.255.255.192)
What networking model is in use? provides 2(32−26)−2=622(32−26)−2=62 usable host addresses, which is still
not enough.
o point-to-point ▪ A /24 subnet mask (255.255.255.0)
o client-based provides 2(32−24)−2=2542(32−24)−2=254 usable host addresses, which is
o peer-to-peer (P2P) sufficient for 200 devices.
o master-slave Therefore, the smallest subnet mask that the network administrator can use for the new
LAN to support 200 connected devices is 255.255.255.0.
Explanation:
69.
Peer-to-peer (P2P) networks have two or more network Which wireless
devices technology has low-power and data rate requirements making it popular in home
that can share
automation
resources such as printers or files without having a dedicated applications?
server.
68. A network administrator is adding a new
o ZigBee
LAN to a branch office. The new LAN must
o 5G
support 200 connected devices. What is the
o Wi-Fi
smallest network mask that the network
o LoRaWAN
administrator can use for the new network?
o

o 255.255.255.224 Explanation & Hint:


o 255.255.255.240 The wireless technology that has low-power and data rate requirements and is popular
o 255.255.255.192 in home automation applications is ZigBee.
o 255.255.255.0 ZigBee is specifically designed for low-data rate, low-power applications and is based on
o the IEEE 802.15.4 standard. It is widely used in home automation, sensor networks, and
IoT (Internet of Things) applications because it is optimized for intermittent data
Explanation & Hint:
transmission from a sensor or input device. ZigBee networks can operate for years on
To determine the smallest network mask that can support 200 connected devices, you
inexpensive batteries, making them an ideal choice for these types of applications.
need to calculate the subnet size that can accommodate at least 200 host addresses.

Here’s how to determine the required subnet size:70. What are two characteristics shared by TCP and UDP? (Choose two.)

. Each subnet has two addresses that cannot be usedo ability to tothe
for hosts: carry digitized voice
network
address and the broadcast address. o 3-way handshake
A. The remaining number of addresses must be equal default
o to window
or greater thansize
the
number of required hosts (200 in this case). o connectionless communication
o port
The formula to calculate the number of usable host addresses in a numbering
subnet
is 2(32−�)−22(32−n)−2, where �n is the number of bits used for thechecksum
o use of network portion of
the address (the subnet mask). Explanation:
You will need to find the smallest subnet mask that provides at Both
least TCP and UDP use
202 addresses source and destination port numbers to distinguish different
(200
data
for the devices, plus 2 for the network and broadcast addresses). streams and to forward the right data segments to the right applications. Error
checking the header and data is done by both protocols by using a checksum
73.is received.
calculation to determine the integrity of the data that What characteristic describes antispyware?
TCP is connection-
oriented and uses a 3-way handshake to establish an initial connection. TCP also uses
window to regulate the amount of traffic sent before receiving o an a tunneling protocol that
acknowledgment. UDPprovides remote users with secure access into the network of an
organization
is connectionless and is the best protocol for carry digitized VoIP signals.
o a network device that filters access and traffic coming into a network
o applications that protect end devices from becoming infected with malicious software
71. A client packet is received by a server.
o software on a router that filters traffic based on IP addresses or applications
The packet has a destination port number of
o
69. What service is the client requesting?
Explanation & Hint:
o DHCP Antispyware is best described as applications that protect end devices from
o SMTP becoming infected with malicious software. Antispyware programs are designed to
o TFTP prevent and detect unwanted spyware and remove it if found. They are essential for
o DNS providing real-time protection by scanning for potential threats to prevent spyware from
o becoming embedded on computers or to find and remove it if it has already been
installed.
Explanation & Hint:
74. Protocol)
The client is requesting the TFTP (Trivial File Transfer A network administrator
service. wants to have the same subnet mask for three subnetworks at a small
In networking,
port numbers are used to identify specific services orsite. The site
protocols, andhas
portthe following
number 69 is networks and numbers of devices:
designated for TFTP.
Subnetwork A: IP phones – 10 addresses
Subnetwork
TFTP is a simple protocol to transfer files, and it is used where theB: PCs – 8ofaddresses
simplicity
Subnetwork
implementation is more critical than the advanced features of a more robust file–transfer
C: Printers 2 addresses
protocol like FTP. It is commonly used for transferringWhat
smallsingle subnet
files such mask would
as system boot be appropriate to use for the three subnetworks?
files or configurations over a network.
o 255.255.255.240
o 255.255.255.0
72. What service is provided by Internet
o 255.255.255.248
Messenger? o 255.255.255.252

o An application that allows real-time Explanation:


chatting among remote users. The largest subnet in the topology has 100 hosts in it so the subnet mask must have at
o Resolves domain names, such as least 7 host bits in it (27-2=126). 255.255.255.0 has 8 hosts bits, but this does not meet
cisco.com, into IP addresses. the requirement of providing the maximum number of subnets.
o Uses encryption to provide secure
remote access to network devices 75. Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What
and servers. subnet mask would provide the maximum number of equal size subnets while providing enough host
o Allows remote access to network addresses for each subnet in the exhibit?
devices and servers.
o
Explanation & Hint:
Internet Messenger provides an application that allows real-time chatting among
remote users. This type of service is used for instant messaging, which enables users
to communicate with each other in real-time over the internet, typically using text, and
may also support voice and video communication.
subnet (128 total addresses minus 2 for the network and broadcast addresses), and is
the smallest subnet size that can accommodate the requirement for 100 hosts.

76. Refer to the exhibit. Which protocol was responsible for building the table that is shown?

CCNA1 v7 – ITNv7 – Final Exam Answers 08


o 255.255.255.128 CCNA1 v7 – ITNv7 – Final Exam Answers 09
o 255.255.255.224 o ARP
o 255.255.255.192 o DNS
o 255.255.255.0 o DHCP
o 255.255.255.240 o ICMP
o o

Explanation & Hint: Explanation & Hint:


To determine the appropriate subnet mask for the network shown Theintable shown we
the exhibit, in the image is an ARP (Address Resolution Protocol) table. It is
need
to consider the subnet with the highest number of hosts since that will dictate the size ofIP addresses to their corresponding physical MAC addresses.
responsible for mapping
The entries
the subnet mask. According to the exhibit, the subnet with the largest show
number the IP addresses and their associated physical (MAC) addresses
of hosts
requires support for 100 hosts. along with the type of entry, whether it is dynamic or static.

Here’s how to calculate the subnet mask: ARP is used within a local area network to find the hardware address of a device
associated with an IPv4 address. The “dynamic” type means that the ARP has
. We need a subnet mask that allows for at least 100 hosts.automatically discovered the MAC address, and “static” means that it has been manually
entered into the ARP table and does not change.
A. The formula to calculate the number of hosts is 2(32−�)−22(32−n)−2,
where �n is the number of bits used for the network portion (including the
subnet portion). 77. Which two traffic types use the Real-Time Transport Protocol (RTP)? (Choose two.)
To support at least 100 hosts, we need to find �n such
that 2(32−�)−2≥1002(32−n)−2≥100. o web
▪ The /16 indicates that the first 16 bits are already o peer
used forto peer
the network part.
o file transfer
So, we are left with 16 bits to play with for subnetting and hosts.
video
▪ We need to find the smallest subnet size that can oaccommodate 100 hosts.
Let’s calculate the required subnet size. o voice
o
The subnet mask that would provide the maximum number of equal size subnets
Explanation while
& Hint:
providing enough host addresses for each subnet in the exhibitThe
is 255.255.255.128. This Protocol (RTP) is primarily designed for delivering audio and
Real-Time Transport
subnet mask corresponds to a /25 subnet size, which supports video
up to 126
overhosts per It is used in streaming media systems (both live and on-demand),
networks.
video conferencing, and push-to-talk systems (like VoIP, voiceA. Environmental threats – These include temperature extremes (too hot or too
over IP), where timely
delivery is more important than accurate delivery. cold) or humidity extremes (too wet or too dry). Environmental threats can cause
equipment to fail prematurely or operate inefficiently.
So, among the options provided: B. Electrical threats – These refer to voltage spikes, insufficient supply voltage
(brownouts), unconditioned power (noise), and total power loss. These threats
▪ Video can lead to equipment damage or data loss.
▪ Voice C. Maintenance threats – These might include unauthorized access resulting in loss
These two traffic types use RTP because it supports the delivery of of
data. They can
real-time data,also be associated with poor maintenance practices that fail to
providing features for managing the timing and synchronizationprevent
requiredorfor
predict the failure of systems.
conversing
or viewing media in real time. 79. Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate
with host D, but host A does not have the MAC address for its default gateway. Which network hosts
78. Match the type of threat with the cause. will receive the ARP request sent by host A?
(Not all options are used.)

CCNA1 v7 – ITNv7 – Final Exam Answers 10


o only hosts A, B, C, and D
o only router R1
o only hosts A, B, and C
o only hosts B and C
o only hosts B, C, and router R1
o only host D
Explanation:
Since host A does not have the MAC address of the default gateway in its ARP table,
host A sends an ARP broadcast. The ARP broadcast would be sent to every device on
the local network. Hosts B, C, and router R1 would receive the broadcast. Router R1
CCNA1 v7 Final Exam Answers 006 would not forward the message.
Explanation & Hint:
. Hardware threats – These are typically associated 80.with Which
physicalvalue,
damagethattois contained in an IPv4 header field, is decremented by each router that receives
a packet?
servers, routers, switches, cabling plants, and workstations. Hardware threats can
also include poor handling of key electrical components, which can lead to
o Differentiated Services
electrostatic discharge, and issues such as lack of critical spare parts, poor
o Fragment Offset
cabling, and poor labeling.
o Header Length
o Time-to-Live ▪ R1: G0/0 – This is the correct interface, as it is the Gigabit Ethernet interface
o on R1 that is likely to be connected to the same subnet as H1.
Explanation & Hint: ▪ R2: S0/0/0 – This is another interface on R2, which is also not directly
The value that is contained in an IPv4 header field and is decremented by connected
each routerto H1.
that receives a packet is the Time-to-Live (TTL). This field is used to ▪avoid
R1:aS0/0/0 – This is a serial interface on R1, which would typically be used to
situation
where an undeliverable packet circulates indefinitely. The TTL field is setconnect
by the sender
to other routers, not hosts.
of the packet and is decreased by one by each router that forwards
The correct
the packet.
default
Whengateway setting for host H1 would be the IP address assigned to R1:
the TTL field reaches zero, the packet is discarded. This mechanism
G0/0. helps to ensure
that packets do not loop endlessly due to routing errors.
81. Refer to the exhibit. The IP address of 82. Which two statements describe features of an IPv4 routing table on a router? (Choose two.)
which device interface should be used as
the default gateway setting of host H1? o Directly connected interfaces will have two route source codes in the routing table: C and S .
o The netstat -r command can be used to display the routing table of a router.
o If there are two or more possible routes to the same destination, the route associated with the higher
metric value is included in the routing table.
o The routing table lists the MAC addresses of each active interface.
o If a default static route is configured in the router, an entry will be included in the routing table with
source code S .
o It stores information about routes derived from the active router interfaces.
o
Explanation & Hint:
Typically, in an IPv4 routing table on a router:

▪ Directly connected interfaces are identified by the route source code ‘C’
which stands for connected. They are present in the routing table because the
router has an interface in those networks.
CCNA1 v7 – ITNv7 – Final Exam Answers 11 ▪ Static routes are identified by the route source code ‘S’. This includes any
o R2: S0/0/1 static routes that have been manually configured on the router, such as a
o R1: G0/0 default static route.
o R2: S0/0/0 However, directly connected interfaces having two route source codes ‘C’ and ‘S’ in the
o R1: S0/0/0 routing table is not a standard feature in IPv4 routing tables. In most cases, the ‘C’ code
o is used for directly connected networks, while ‘S’ is used exclusively for static routes. It’s
Explanation & Hint: possible that this statement is referring to a specific scenario where a static route has
been
In a network topology, the default gateway for a host is the router configured
interface foron
that is a the
network that is also directly connected, but this is not typical
same network as the host and is used to forward traffic to otherbehavior
networks. asThe
static routes are generally used to define routes to networks that are not
default
gateway should be set to the IP address of the router interface directly connected.
that is directly connected
to the same subnet as the host.
With this in mind, the correct statements about features of an IPv4 routing table on a
Based on the exhibit provided, host H1 is directly connected to router, based
router R1. on standard
Therefore, the networking practices, include:
default gateway for H1 should be set to the IP address of the interface on R1 that is in
▪ If a default static route is configured in the router, an entry will be included in
the same network as H1. Given the options:
the routing table with source code ‘S’.
If your source is stating that directly connected interfaces will have two route source
▪ R2: S0/0/1 – This is an interface on R2, which is not directly connected to H1.
codes in the routing table: ‘C’ and ‘S’, then it’s important to consider the specific context
or platform where this might be the case. It could be a particularExplanation
configuration& or
Hint:
a
platform-specific feature that is not widely applicable across different
The consequence
router models of or
configuring a router with the ipv6 unicast-routing global
operating systems. configuration command is that it enables the router to forward IPv6 unicast packets. This
command does not automatically activate all router interfaces or create global unicast
83. Three bank employees are using the addresses on them. Rather, it enables the IPv6 routing capability of the router, allowing
corporate network. The first employee uses it to route IPv6 traffic between different networks.
a web browser to view a company web page Here’s what happens when the command is applied:
in order to read some announcements. The
second employee accesses the corporate ▪ The router becomes capable of forwarding IPv6 packets, acting as an IPv6
database to perform some financial router.
transactions. The third employee ▪ IPv6 enabled router interfaces can then send ICMPv6 Router Advertisement
participates in an important live audio (RA) messages if they are configured with an IPv6 address and the interface is
conference with other corporate managers activated. These RA messages are used to announce the presence of the
in branch offices. If QoS is implemented on router to other devices on the network and provide necessary network
this network, what will be the priorities from information for configuration.
highest to lowest of the different data ▪ Router interfaces can generate an IPv6 link-local address, but this is not
types? directly due to the ipv6 unicast-routing command. Link-local addresses are
automatically generated for IPv6-enabled interfaces, regardless of the routing
o financial transactions, web page, configuration, as part of the IPv6 protocol standards.
audio conference Therefore, the most accurate consequence of the command is that the IPv6-enabled
o financial transactions, audio router interfaces begin sending ICMPv6 Router Advertisement messages, assuming that
conference, web page the interfaces are configured properly with IPv6 addresses.
o audio conference, financial
transactions, web page 85. Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model
o audio conference, web page, financial would be used?
transactions
Explanation:
QoS mechanisms enable the establishment of queue management strategies that
enforce priorities for different categories of application data. Thus, this queuing enables
voice data to have priority over transaction data, which has priority over web data.

84. What is the consequence of configuring


a router with the ipv6 unicast-routing global
configuration command?
o All router interfaces will be
automatically activated.
o Each router interface will generate an
IPv6 link-local address.
o The IPv6 enabled router interfaces CCNA1 v7 – ITNv7 – Final Exam Answers 12
begin sending ICMPv6 Router o only application, Internet, and network access layers
Advertisement messages. o only application, transport, network, data link, and physical layers
o It statically creates a global unicast o application, session, transport, network, data link, and physical layers
address on this router. o only application and Internet layers
o o application, transport, Internet, and network access layers
o only Internet and network access by displaying ads or redirecting browser searches to advertising websites. It’s often
layers bundled with free software or downloads and can be considered a form of potentially
Explanation: unwanted program (PUP).
The TCP/IP model contains the application, transport, internet, and network access
layers. A file transfer uses the FTP application layer protocol. The
Thedata would
primary move from
purpose of adware is to generate revenue for its developers by showing
the application layer through all of the layers of the model and across
advertisements
the network
to the
to the
user. Some adware tracks user behavior to target ads more
file server. effectively. While not always malicious in intent, adware can affect system performance
and can sometimes lead to security vulnerabilities.
86. The global configuration command ip
default-gateway 172.16.100.1 is applied to a 88. Match each description with the corresponding TCP mechanism. (Not all options are used.)
switch. What is the effect of this command?
o The switch can communicate with
other hosts on the 172.16.100.0
network.
o The switch can be remotely managed
from a host on another network.
o The switch will have a management
interface with the address
172.16.100.1.
o The switch is limited to sending and
receiving frames to and from the
gateway 172.16.100.1.
Explanation:
A default gateway address is typically configured on all devices to allow them to
communicate beyond just their local network. In a switch this is achieved using the
command ip default-gateway <ip address>.

87. What characteristic describes adware? CCNA1 v7 Final Exam Answers 007
Explanation & Hint:
o a network device that filters access “number of bytes a destination device can accept and process at one time” matches
and traffic coming into a network with window size. The window size determines the volume of data that can be sent before
o an attack that slows or crashes a an acknowledgment is required.
device or network service “used to identify missing segments of data” aligns with sequence numbers. Sequence
o the use of stolen credentials to numbers are used to track the order of segments and identify if any are missing.
access private data “method of managing segments of data loss” corresponds to retransmission.
o software that is installed on a user Retransmission is used by TCP to resend data segments that have been lost or
device and collects information about acknowledged as not received.
the user “received by a sender before transmitting more segments in a session” relates
o to acknowledgment. The sender waits for an acknowledgment from the receiver before
Explanation & Hint: sending more data segments.
Adware is a type of software that is installed on a 89.
user’s What
device,istypically without
the purpose oftheir full sliding window?
the TCP
knowledge, which displays unwanted advertising and collects information about the
user’s browsing habits. Adware can be intrusive and can degrade the user
o to ensure experience
that segments arrive in order at the destination
o to request that a source decrease the o encasing the cables within a flexible plastic sheath
rate at which it transmits data Explanation:
o to inform a source to retransmit data To help prevent the effects of crosstalk, UTP cable wires are twisted together into pairs.
from a specific point forward Twisting the wires together causes the magnetic fields of each wire to cancel each other
o to end communication when data out.
transmission is complete
o
91. A network technician is researching the use of fiber optic cabling in a new technology center.
Explanation & Hint: Which two issues should be considered before implementing fiber optic media? (Choose two.)
The purpose of the TCP sliding window is not specifically any of the options listed. The
sliding window mechanism in TCP serves multiple purposes: o Fiber optic cabling requires different termination and splicing expertise from what copper cabling
requires.
▪ It controls the flow of data between the sender and o the receiver
Fiber optic to ensure
cabling that specific grounding to be immune to EMI.
requires
the sender does not overwhelm the receiver’s buffer. o Fiber optic cabling is susceptible to loss of signal due to RFI.
▪ It allows for more efficient use of the network by enabling
o Fiberthe sender
optic to higher data capacity but is more expensive than copper cabling.
provides
transmit multiple segments before needing an acknowledgment,
o Fiber optic cable isthan
rather able to withstand rough handling.
waiting for an acknowledgment after each individual segment (which would be
Explanation and Hint:
inefficient and increase latency).
Fiber optic media is more expensive than copper cabling used over the same distance.
▪ It dynamically adjusts the rate of data transmission based on the receiver’s
Fiber optic cables use light instead of an electrical signal, so EMI and RFI are not
ability to process data and the condition of the network (congestion control).
issues. However, fiber optic does require different skills to terminate and splice.
So, while it indirectly ensures that segments are processed in order by the receiver and
can be involved in mechanisms that decrease the rate of data transmission or result in
retransmission requests, its primary purpose is flow92.control—managing
Users are reporting longerofdelays in authentication and in accessing network resources during
the amount
outstanding data (data sent but not yet acknowledged) to match
certain timethe receiver’s
periods of the week. What kind of information should network engineers check to find out
processing capabilities and current network conditions. if this situation is part of a normal network behavior?

If we were to choose the option closest to the primary functiono syslog records
of the TCP and messages
sliding
window from the ones provided, it would be: o debug output and packet captures
o network configuration files
▪ to request that a source decrease the rate at which o itthe network
transmits performance baseline
data
This is because the sliding window can scale down the window o size if the network is
congested or the receiver’s buffer is full, effectively reducing theExplanation
rate at which&the sender
Hint:
can transmit data. However, it should be noted that the primaryTo purpose is still
determine flow the reported delays are part of normal network behavior, network
whether
control, which includes managing transmission rates as just oneengineers
aspect. should check:

90. What technique is used with UTP cable ▪ The network performance baseline: A baseline consists of data that
to help protect against signal interference represents typical network performance during normal operational periods. By
from crosstalk? comparing current performance metrics to the baseline, engineers can
determine if the delays are within normal ranges or indicative of a problem.
o terminating the cable with special If the delays are outside the normal baseline, engineers might then consult:
grounded connectors
o twisting the wires together into pairs ▪ Syslog records and messages: These can provide insight into system events
o wrapping a foil shield around the wire and errors that occur on network devices, which might contribute to the delays.
pairs ▪ Debug output and packet captures: These tools are useful for real-time
troubleshooting and in-depth analysis of the traffic flow, but they might be too
granular for determining normal behavior patterns unless Usingspecific
tracert,issues
the technician
have can see each hop along the path to the destination web
been identified that need detailed investigation. server and the time taken to reach each hop, which can help locate the segment of the
Checking the baseline is generally the first step, as it gives an overview
network that
of expected
is causing the delay.
performance against which actual performance can 94.be measured. If anomalies
A client packet are by a server. The packet has a destination port number of 53. What
is received
found, more detailed diagnostics like syslogs, debug service
outputs,is
and
thepacket
clientcaptures
requesting?might
be used to investigate further.
o SSH
93. A user is complaining that an external o FTP
web page is taking longer than normal to o Telnet
load.The web page does eventually load on o DNS
the user machine. Which tool should the o
technician use with administrator privileges Explanation & Hint:
in order to locate where the issue is in the The client is requesting DNS (Domain Name System) service. Port 53 is the standard
network? port used for DNS queries. DNS is used to translate domain names (like
www.example.com) into IP addresses that can be used by the network to route requests
o ipconfig /displaydns to the correct server.
o nslookup
o tracert
95. Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this
o ping
scenario, what will happen next?
o
Explanation & Hint:
To locate where the issue is in the network when a web page is taking longer than
normal to load, a technician should use:

▪ tracert (or traceroute on Unix/Linux systems): This tool traces the path that
a packet takes to reach a destination and displays the time it takes to hop from
one router to another. It can help identify at which point in the path there might
be delays or a bottleneck causing the increased load time.
While the other tools listed are useful for different purposes, they wouldn’t be as
effective in locating the issue in the network path:

▪ ipconfig /displaydns: Displays the contents of the DNS client resolver cache, CCNA1 v7 – ITNv7 – Final Exam Answers 13
o RT1 will send an ARP reply with its Fa0/0 MAC address.
which includes the DNS records recently queried by the computer. This
o SW1 will send an ARP reply with the PC2 MAC address.
command is useful for checking cached DNS records but doesn’t help to locate
o RT1 will send an ARP reply with the PC2 MAC address.
network delays.
o SW1 will send an ARP reply with its Fa0/1 MAC address.
▪ nslookup: This is a network administration command-line tool used for
o PC2 will send an ARP reply with its MAC address.
querying the Domain Name System (DNS) to obtain domain name or IP
address mapping or for any other specific DNS records. It’s useful for checking
Explanation:
if DNS resolution is part of the problem but doesn’t show
When theanetwork
networkpath or wants to communicate with another device on the same
device
where delays occur. network, it sends a broadcast ARP request. In this case, the request will contain the IP
▪ ping: A ping command would tell you if the destination address of PC2.
is reachable The
and destination device (PC2) sends an ARP reply with its MAC
what
the round-trip time (RTT) for the message is, but it won’t show where along the
address.
path potential issues are occurring.
96. Match the description to the IPv6 addressing component. (Not all options are used.)
98. What are the three parts of an IPv6 global unicast address? (Choose three.)

o subnet ID
o global routing prefix
o interface ID
o subnet mask
o broadcast address
o
Explanation & Hint:
The three parts of an IPv6 global unicast address are:

. Global routing prefix: This is the prefix or network portion of the address that
is assigned by the provider, such as an ISP, to a customer or other
organization.
CCNA1 v7 Final Exam Answers 008
A. Subnet ID: This is used by an organization to identify subnets within its site.
Explanation & Hint: The subnet ID is part of the local administration, allowing for internal
. “This part of the address is used by an organization to identify subnets.” matches
organization and routing.
with subnet ID. This is the part of the IPv6 address that an organization can use ID: This is the unique identifier for an interface within a subnet. An
B. Interface
to create its internal addressing structure, defining different subnetworks interface
within its ID is typically 64 bits long, often automatically generated from the
allocation. MAC address of the interface using the EUI-64 format.
A. “This network portion of the address is assigned by the provider.” matches
IPv6 does not use a subnet mask as IPv4 does; instead, the prefix length specifies the
with global routing prefix. This is the portion of the IPv6 address provided
division of thebyaddress
the into the network and interface portions. Also, IPv6 does not have
ISP or a regional internet registry, which is used to route traffic atobroadcast
the address; it uses multicast addressing to achieve similar functionality.
organization’s network on the internet.
B. “This part of the address is the equivalent to the host portion of an IPv4 address.”
99.is theWhat is one main characteristic of the data link layer?
matches with interface ID. In IPv6, the interface ID portion of the address
that is typically used to identify a unique interface on a network, similar to how the
host portion of an IPv4 address identifies a unique host in aosubnet.It generates the electrical or optical signals that represent the 1 and 0 on the media.
o It converts a stream of data bits into a predefined code.
97. An IPv6 enabled device sends a data o It shields the upper layer protocol from being aware of the physical medium to be used in the
packet with the destination address of communication.
FF02::2. What is the target of this packet? o It accepts Layer 3 packets and decides the path by which to forward the packet to a remote network.
o
o all IPv6 enabled devices on the local
Explanation & Hint:
link
One main characteristic of the data link layer is:
o all IPv6 DHCP servers
o all IPv6 enabled devices across the
It shields the upper layer protocol from being aware of the physical medium to be
network
used in the communication.
o all IPv6 configured routers on the
The data link layer (Layer 2) in the OSI model is responsible for node-to-node data
local link
transfer—a function that includes detecting and possibly correcting errors that may
o
occur in the physical layer. It essentially provides a way for data to be transferred
Explanation & Hint: reliably across a physical link.
The destination address FF02::2 is an IPv6 multicast address that targets all IPv6
configured routers on the local link. IPv6 multicast addresses are used to send a
100. Which
single packet to a group of hosts, in this case, all routers on the type
local of security threat would be responsible if a spreadsheet add-on disables the local
subnet.
software firewall?
o Trojan horse
o brute-force attack
o DoS
o buffer overflow
Explanation:
A Trojan horse is software that does something harmful, but is hidden in legitimate
software code. A denial of service (DoS) attack results in interruption of network
services to users, network devices, or applications. A brute-force attack commonly
involves trying to access a network device. A buffer overflow occurs when a program
attempts to store more data in a memory location than it can hold.

101. What service is provided by HTTPS?

o Allows remote access to network


devices and servers.
o Resolves domain names, such as CCNA1 v7 Final Exam Answers 009
cisco.com, into IP addresses. Explanation & Hint:
o Uses encryption to provide secure The characteristics given in the image seem to describe the differences between IP
remote access to network devices addresses and MAC addresses. While I can’t see the full details, I can provide information
and servers. based on standard networking knowledge:
o Uses encryption to secure the
exchange of text, graphic images, o Contained in the Layer 3 header: This characteristic is related to the IP
sound, and video on the web. address.
o o Contained in the Layer 2 header: This characteristic is related to the MAC
Explanation & Hint: address.
The service provided by HTTPS is: o Separated into OUI and a unique identifier: This characteristic is related to
the MAC address. The Organizationally Unique Identifier (OUI) is part of a MAC
Uses encryption to secure the exchange of text, graphic images, addresssound,
that uniquely identifies the manufacturer or vendor of the network
and video
on the web. interface card.
o Separated
HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP,into a network
which is the portion and a unique identifier: This characteristic is
related
protocol used for transmitting web pages over the internet. It uses to theencryption
SSL/TLS IP address. An IP address is divided into a network and a host
to secure the connection between the client’s web browser andportion,
the webwhich
server, ensuring
identifies a specific network and a specific device on that network.
o
that all data passed between them remains private and integral. 32 or 128 bits: This characteristic relates to the length of IP addresses. IPv4
addresses are 32 bits in length, and IPv6 addresses are 128 bits in length.
o 48 bits: This is the length of a MAC address, which is always 48 bits in length.
102. Match the characteristic to the category.
o 64 bits: This could potentially refer to several things in networking, but it often
(Not all options are used.)
refers to the length of the interface identifier in an IPv6 address when using the
EUI-64 format, or it might refer to a subnet size in IPv6 addressing, neither of
which are specific to MAC addresses.
103. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in
the frame when it leaves host A?
o A packet that has crossed four routers has changed the destination IP address four times.
o Every time a frame is encapsulated with a new destination MAC address, a new destination IP
address is needed.
o Destination and source MAC addresses have local significance and change every time a frame goes
from one LAN to another.
o Destination IP addresses in a packet header remain constant along the entire path to a target host.
o
Explanation & Hint:
When considering data transmission without NAT (Network Address Translation), the
correct statements about MAC and IP addresses are:
CCNA1 v7 – ITNv7 – Final Exam Answers 14
o 172.168.10.65 . Destination and source MAC addresses have local significance and
o 172.168.10.99 change every time a frame goes from one LAN to another. MAC addresses
o AA:AA:AA:AA:AA:AA are used for local area network (LAN) segment delivery and are changed at
o CC:CC:CC:CC:CC:CC each hop where the frame is forwarded by routers, as the router will replace
o BB:BB:BB:BB:BB:BB the source MAC address with its own and the destination MAC address with
o DD:DD:DD:DD:DD:DD that of the next hop.
o A. Destination IP addresses in a packet header remain constant along the
Explanation & Hint: entire path to a target host. When a packet is sent from a source to a
When Host A sends a packet to Host B, and they are on different networks,destination,
Host A willthe source and destination IP addresses in the packet header
need to send the packet to its configured gateway so it can be routed to Host
remainB’sthe same from the source to the destination if NAT is not being used.
Routers
network. The destination MAC address in the frame as it leaves Host A will indeed use
bethese IP addresses to make forwarding decisions and do not alter
the MAC address of its default gateway, which is the interface on Routerthem when
R1 that routing.
is on
the same subnet as Host A. The other statements are incorrect:

Given the network diagram, the correct destination MAC address for the ▪ Destination
frame leavingMAC addresses will never change in a frame that goes
Host A should be the MAC address of R1’s interface on the same network across seven
as Host A, routers. This statement is incorrect because, as mentioned, the
which is BB:BB:BB:BB:BB:BB if R1 is the gateway for Host A. destination MAC address changes at each hop.
The previous response incorrectly identified the MAC address of R1. The ▪ Acorrect
packetMAC
that has crossed four routers has changed the destination IP
address for the gateway router’s interface, according to the exhibit, is indeed
address four times. This statement is false because, without NAT, the
BB:BB:BB:BB:BB:BB. Host A will send the frame with this MAC address destination
as the IP address remains the same across all routers.
Everytowards
destination to reach its default gateway (R1), which will then route the▪ packet time a frame is encapsulated with a new destination MAC address,
Host B. a new destination IP address is needed. This is not correct; the destination
IP address does not change even though the MAC address changes as the
104. Which two statements are correct about frame moves through different segments of the network.
MAC and IP addresses during data 105. Refer to the exhibit. What three facts can be determined from the viewable output of the show ip
transmission if NAT is not involved? interface brief command? (Choose three.)
(Choose two.)

o Destination MAC addresses will never


change in a frame that goes across
seven routers.
106. A user is executing a tracert to a remote device. At what point would a router, which is in the path
to the destination device, stop forwarding the packet?
o when the values of both the Echo Request and Echo Reply messages reach zero
o when the value in the TTL field reaches zero
o when the router receives an ICMP Time Exceeded message
o when the host responds with an ICMP Echo Reply message
o when the RTT value reaches zero
Explanation:
When a router receives a traceroute packet, the value in the TTL field is decremented by
1. When the value in the field reaches zero, the receiving router will not forward the
packet, and will send an ICMP Time Exceeded message back to the source.
CCNA1 v7 – ITNv7 – Final Exam Answers 15
o Two devices are attached to the 107. What are two functions that are provided by the network layer? (Choose two.)
switch.
o The default SVI has been configured. o carrying data between processes that are running on source and destination hosts
o The switch can be remotely o directing data packets to destination hosts on other networks
managed. o providing dedicated end-to-end connections
o Two physical interfaces have been o placing data on the network medium
configured. o providing end devices with a unique network identifier
o Passwords have been configured on o
the switch. Explanation & Hint:
o One device is attached to a physical
The two functions that are provided by the network layer are:
interface.
o
. Directing data packets to destination hosts on other networks: The
Explanation & Hint: network layer is responsible for determining the best path for data to travel
Based on the output provided from the show ip interface brief command,from threethe
facts can to the destination across multiple networks, which is known as
source
be determined: routing.
. The switch can be remotely managed: This is indicated byA.the IP address
Providing end devices with a unique network identifier: The network layer
assigned to the VLAN1 interface, which is up and running. The assigns
IP address
IP addresses to end devices. These IP addresses are used to uniquely
192.168.11.3 allows remote management if routing and accessidentify control each
lists device on a network and can be used to determine the path that
permit it. data should take through the network to reach its destination.
A. One device is attached to a physical interface: FastEthernet0/1 has a status
108. A network administrator is adding a new LAN to a branch office. The new LAN must support 61
of “up” and a protocol of “up”, which typically means that a device is connected
connected devices. What is the smallest network mask that the network administrator can use for the
and operational on that interface.
new network?
B. The default SVI has been configured: The VLAN1 interface is configured
with an IP address, suggesting that the default SVI has been set up.
o 255.255.255.224
The output does not provide enough information to conclude that two devices are
o 255.255.255.240
attached to the switch, that passwords have been configured on the switch, or that two
o 255.255.255.192
physical interfaces have been configured (beyond the one that is up). The “unassigned”
o 255.255.255.128
status for the IP address field on the physical interfaces also indicates that no IP
o
addresses have been assigned to these interfaces, which is typical for layer 2 switch
ports. Explanation & Hint:
o tensile
To support 61 connected devices, you need a subnet that can providestrength
at least of
61plastic
usableinsulator
cable lengths
IP addresses (remembering that in any given subnet, two IPo addresses are always used
connector types
up – one for the network address and one for the broadcastoaddress).
o cost per meter (foot)
Here’s how the subnet masks break down in terms of number connector
o of availablecolor
hosts:
o
▪ 255.255.255.224 – This is a /27 subnet mask, which allows
Explanation & Hint: in
for 32 addresses
In the construction
total, but with 2 addresses used for network and broadcast, and installation of cabling, the following three are commonly followed
you get 30 usable
addresses. standards:
▪ 255.255.255.240 – This is a /28 subnet mask, which allows for 16 addresses in
total, with 14 usable addresses. . Pinouts: This refers to the arrangement of conductors in the cable to connect
▪ 255.255.255.192 – This is a /26 subnet mask, which allows for with
64 addresses
the corresponding
in pins or contacts in connectors. Correct pinouts are
total, but with 2 addresses used for network and broadcast, youcrucial
get 62for the network to function properly, as they ensure that signals are
usable
addresses. properly transmitted and received.
▪ 255.255.255.128 – This is a /25 subnet mask, which allows A. for Cable lengths: Standards often specify the maximum length for different types
128 addresses
in total, with 126 usable addresses. of cables to ensure signal integrity. For example, the Ethernet standard for
The smallest subnet mask that will support 61 connected devices, allowing Cat5e/Cat6
for the cabling specifies a maximum length of 100 meters (328 feet) to
network and broadcast addresses, is 255.255.255.192 or a /26 subnet mask. preventThis
signal
will degradation.
allow for 62 usable IP addresses, just enough for the 61 devices needed.
B. Connector types: The use of standardized connectors ensures interoperability
109. What characteristic describes spyware? and proper physical connection. Common types include RJ-45 for Ethernet
cables and LC/SC connectors for fiber optics.
o a network device that filters access Other factors like tensile strength of the plastic insulator, cost per meter, and connector
and traffic coming into a network color, while they may be considered during the selection and installation process, are
o software that is installed on a user not standardized attributes in the same sense as pinouts, cable lengths, and connector
device and collects information about types.
the user
o an attack that slows or crashes a 111. Which connector is used with twisted-pair cabling in an Ethernet LAN?
device or network service
o the use of stolen credentials to
access private data
o
Explanation & Hint:
Spyware is best described as:

Software that is installed on a user device and collects information about the user.
Spyware is typically covertly installed on a user’s device without their knowledge
o Answers RJ 45 and
gathers information on the individual’s internet activity, personal information, or other
data, often for advertising purposes or malicious intent.

110. What are three commonly followed


standards for constructing and installing
cabling? (Choose three.)

o pinouts o
The network administrator should choose SSH (Secure Shell) to keep the user ID,
password, and session contents private when establishing remote CLI connectivity with
a switch. SSH provides a secure channel over an unsecured network by using
encryption, which ensures confidentiality and integrity of data.
The other methods listed have the following characteristics:

▪ AUX (Auxiliary port): This is used for remote management similar to the
o console port but usually over a modem. It does not inherently provide
encryption for security.
▪ Telnet: This is an older protocol that provides no encryption, making it
insecure for transmitting sensitive information because the session contents,
including user ID and password, can be intercepted.
▪ Console: The console port is for direct physical connection to the device and
does not provide encryption because it’s designed for a direct serial connection
rather than remote access.
o
112. What attribute of a NIC would place it at 114. A user sends an HTTP request to a web server on a remote network. During encapsulation for this
the data link layer of the OSI model? request, what information is added to the address field of a frame to indicate the destination?

o attached Ethernet cable o the network domain of the destination host


o TCP/IP protocol stack o the MAC address of the default gateway
o IP address o the IP address of the default gateway
o RJ-45 port o the MAC address of the destination host
o
o MAC address
o Explanation & Hint:
Explanation & Hint: During encapsulation for an HTTP request to a web server on a remote network, the
information
The attribute of a NIC (Network Interface Card) that would place thatLink
it at the Data is added
layer to the address field of a frame to indicate the destination would
of the OSI model is the MAC address. The Data Link layer is responsible for node-to-of the default gateway.
be the MAC address
node communication and typically includes physical addressing, Here’s
whichwhy:
is theThe
MACdestination web server is on a remote network, so the user’s computer
address in the case of Ethernet networks. The MAC address is cannot
unique directly
to eachaddress
NIC andthe frame to the web server’s MAC address. Instead, it sends
the
allows for hardware-level addressing at Layer 2 of the OSI model. frame to the MAC address of its configured default gateway (typically the router on
the local network), which then takes responsibility for routing the packet towards the
113. A network administrator needs to keep destination server across the internet.
the user ID, password, and session
contents private when establishing remote
CLI connectivity with a switch to manage it. 115. Which two commands can be used on a Windows host to display the routing table? (Choose two.)
Which access method should be chosen?
o route print
o show ip route
o AUX
o netstat -r
o Telnet
o SSH o netstat -s
o tracert
o Console
o Answers Explanation & Hints:
Explanation & Hint: On a Windows host, the route print or netstat -r commands can be used to display the
host routing table. Both commands generate the same output. On a router, the show ip
–s command
route command is used to display the routing table. The netstatclear which description
is used toit should be matched to. In common practice, an IP
display per-protocol statistics. The tracert command is used to display
addressthein this
pathrange
that awould be considered a private address.
packet travels to its destination. Please note that this is based on common networking knowledge and the typical use of
these IP ranges; the matching might differ if the context provided in the exercise specifies
116. Match each description with an alternative interpretations.
appropriate IP address. (Not all options are
used.) 117. Refer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the
usable host addressing requirements for each network. (Not all options are used.)

CCNA1 v7 & v7.02 – ITNv7 – Final Exam


Answers 001
Explanation & Hint:
o 127.0.0.1: This is a loopback address. It’s used by a host to send traffic to itself for
testing and troubleshooting.
o 198.133.219.2: This would be considered a public address. It’s a routable IP
address on the internet, not within the private IP address ranges.
o 169.254.1.5: This is a link-local address. In IPv4, addresses in the 169.254.0.0/16
range are used for automatic IP addressing when no external DHCP server is
available (APIPA).
o 240.2.6.255: This address falls within the range of 240.0.0.0 to 255.255.255.254,
which is reserved for future use, often considered as part of the experimental
address space, although it was originally designated for Class E network
purposes.
o 172.18.45.9: This IP address is within the range of 172.16.0.0 to 172.31.255.255,
which is designated for private networks and is not a public IP address. However,
without a clear label for a private address in the image you provided, and since
the address is not specifically linked to any of the other listed descriptions, it’s less
CCNA1 v7 & v7.02 – ITNv7 – Final Exam
Answers 01
CCNA1 v7 & v7.02 – ITNv7 – Final Exam The client is requesting the HTTP (Hypertext Transfer Protocol) service. Port 80 is the
Answers 002 standard port for HTTP, which is used for transmitting web pages on the internet.
Explanation:
Network A needs to use 192.168.0.0 /25 which yields 128 host
120.addresses.
A user is attempting to access http://www.cisco.com/ without success. Which two configuration
Network B needs to use 192.168.0.128 /26 which yields 64 host addresses.
values must be set on the host to allow this access? (Choose two.)
Network C needs to use 192.168.0.192 /27 which yields 32 host addresses.
Network D needs to use 192.168.0.224 /30 which yields 4 host addresses.
o source port number
o HTTP server
118. A technician with a PC is using multiple o source MAC address
applications while connected to the o DNS server
Internet. How is the PC able to keep track of o default gateway
the data flow between multiple application o
sessions and have each application receive Explanation & Hint:
the correct packet flows? To access a website like “http://www.cisco.com/”, the host requires the following
configuration values to be set:
o The data flow is being tracked based
on the source port number that is . DNS server: The Domain Name System (DNS) server is necessary for
used by each application. resolving the domain name “www.cisco.com” into its corresponding IP address.
o The data flow is being tracked based Without this, the host would not be able to translate the URL into an address it
on the destination IP address that is can connect to.
used by the PC of the technician. A. Default gateway: The default gateway is used to send packets from the local
o The data flow is being tracked based network to devices on other networks. If the host doesn’t have a default
on the source IP address that is used gateway configured, it wouldn’t be able to route packets to the destination
by the PC of the technician. outside of its local network.
o The data flow is being tracked based The source port number is determined dynamically by the host for the duration of the
on the destination MAC address of session and is not something that is typically manually configured for web access. The
the technician PC. HTTP server is a remote server that hosts the website content and is not a configuration
Explanation: value on the host. The source MAC address is also not a configuration that needs to be
The source port number of an application is randomly generated manually
and used settofor web access; it’s inherent to the network interface of the host device.
individually
keep track of each session connecting out to the Internet. Each application will use a
unique source port number to provide simultaneous communication
121. What method fromis multiple
used to manage contention-based access on a wireless network?
applications through the Internet.
o CSMA/CD
119. A client packet is received by a server. o priority ordering
The packet has a destination port number of o CSMA/CA
80. What service is the client requesting? o token passing
o
o DNS Explanation & Hint:
o HTTP The method used to manage contention-based access on a wireless network
o DHCP is CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). Unlike
o SMTP Ethernet networks that use CSMA/CD (Carrier Sense Multiple Access with Collision
o Detection), wireless networks cannot reliably detect collisions due to the “hidden node
Explanation & Hint:
problem.” Therefore, they use a method to avoid collisions before
Thethey
organization
happen, which
has been
is assigned a /56 IPv6 address block. IPv6 addresses are 128
what CSMA/CA is designed to do. bits in length. When subnetting an IPv6 address, you generally do not touch the last 64
122. What are two ICMPv6 messages that are bits as they are typically reserved for the interface ID (the actual host address).
not present in ICMP for IPv4? (Choose two.)
Starting with a /56 block, you have:
o Router Advertisement
o Destination Unreachable 128 bits (total IPv6 address length) – 56 bits (assigned block) = 72 bits remaining for
o Neighbor Solicitation subnetting and interface ID.
o Route Redirection
o Host Confirmation Since you do not use the last 64 bits for subnetting (because that’s the interface ID), you
o Time Exceeded have:
o
72 bits – 64 bits (reserved for interface ID) = 8 bits available for subnetting.
Explanation & Hint:
ICMPv6 (Internet Control Message Protocol for IPv6) includes several messages that
With 8 bits available for subnetting, you can create 2^8 subnets, because each bit can
are not present in ICMP for IPv4 due to the differences between the IPv6 and IPv4
be either a 0 or a 1, and there are two possibilities for each bit.
protocols. Among the listed options, the two ICMPv6 messages that are not present in
ICMP for IPv4 are:
So, 2^8 = 256.
. Router Advertisement: This is part of the Neighbor Discovery Protocol (NDP)
Therefore, the organization can create 256 subnets without using bits in the interface ID
in IPv6. Router Advertisements are sent by routers to advertise their presence
space.
along with various link and Internet parameters.
A. Neighbor Solicitation: This is also part 124.
of NDPWhat subnet
in IPv6. maskSolicitations
Neighbor is needed if an IPv4 network has 40 devices that need IP addresses and address
space is not to be wasted?
are used by nodes to determine the link-layer address of a neighbor, or to
verify that a neighbor is still reachable via a cached link-layer address.
The other options, such as “Destination Unreachable” and “Time o 255.255.255.224
Exceeded,” exist in
o 255.255.255.128
both ICMPv6 and ICMP for IPv4. “Route Redirection” is a message type in ICMP for
o 255.255.255.240
IPv4 but not used in ICMPv6. “Host Confirmation” is not a standard message type in
either ICMPv6 or ICMP for IPv4. o 255.255.255.192
o 255.255.255.0
o
123. An organization is assigned an IPv6
address block of 2001:db8:0:ca00::/56. How Explanation & Hint:
many subnets can be created without using To determine the subnet mask needed for a network with 40 devices, you need to
bits in the interface ID space? calculate the subnet size that can accommodate at least 40 hosts. Remember that in a
subnet, two IP addresses are reserved: one for the network address and one for the
o 4096 broadcast address. So, you need a subnet with at least 42 addresses.
o 256
o 512 Here’s how the subnet masks correspond to the number of addresses they provide:
o 1024
o ▪ 255.255.255.224 – This is a /27 subnet mask, which provides 32 addresses
(30 usable for hosts).
Explanation & Hint:
▪ 255.255.255.240 – This is a /28 subnet mask, which provides 16 addresses
(14 usable for hosts).
▪ 255.255.255.192 – This is a /26 subnet mask, which provides 64 addresses
(62 usable for hosts).
▪ 255.255.255.128 – This is a /25 subnet mask, whicho a network128
provides device that filters access and traffic coming into a network
addresses
(126 usable for hosts). o malicious software or code running on an end device
an attack
▪ 255.255.255.0 – This is a /24 subnet mask, whichoprovides 256that slows or crashes a device or network service
addresses
(254 usable for hosts). o
The smallest subnet mask that can accommodate at least 42 addresses
Explanation & Hint:
is 255.255.255.192, which is a /26 subnet mask. This will allow Aforvirus
62 usable
is best IP
described as:
addresses, which is more than enough for 40 devices without wasting too much address
space. Malicious software or code running on an end device.
125. A host is trying to send a packet to a A virus is a type of malware that, when executed, replicates by modifying other
device on a remote LAN segment, but there computer programs and inserting its own code. It typically requires some form of user
are currently no mappings in the ARP interaction, such as opening an infected email attachment or downloading and running a
cache. How will the device obtain a malicious file, to be activated. Once active, a virus can cause harm by stealing data,
destination MAC address? logging keystrokes, or corrupting files.

o It will send an ARP request for the 127. A disgruntled employee is using some free wireless networking tools to determine information
MAC address of the destination about the enterprise wireless networks. This person is planning on using this information to hack the
device. wireless network. What type of attack is this?
o It will send the frame with a broadcast
MAC address. o access
o It will send the frame and use the o DoS
device MAC address as the o Trojan horse
destination. o reconnaissance
o It will send an ARP request for the o
MAC address of the default gateway. Explanation & Hint:
o It will send an ARP request to the The type of attack being described is reconnaissance. This is a type of attack where an
DNS server for the destination MAC attacker gathers information about a network with the intent to circumvent its security
address. controls. It is often considered a preliminary step that can lead to a more serious attack
o once the attacker has gained sufficient information about network vulnerabilities.
Explanation & Hint: 128. What service is provided by POP3?
If a host is trying to send a packet to a device on a remote LAN segment and there are
no mappings in the ARP cache, the device will: o Uses encryption to provide secure remote access to network devices and servers.
o Retrieves email from the server by downloading the email to the local mail application of the client.
It will send an ARP request for the MAC address of the odefault gateway.
Allows remote access to network devices and servers.
In a typical network, a device knows the IP address of the default gateway
o An applicationfrom
thatitsallows real-time chatting among remote users.
network configuration. When it needs to communicate with oa device on a different
network, it will use ARP to resolve the MAC address of the default gateway, because the
Explanation & Hint:
packet needs to be sent there first to be routed to the remote network. The default
The service provided by POP3 (Post Office Protocol version 3) is:
gateway will then forward the packet to the destination on the remote LAN segment
using its own ARP process and routing table.
Retrieves email from the server by downloading the email to the local mail
application of the client.
126. What characteristic describes a virus?

o the use of stolen credentials to


access private data
10.18.10.224/28
POP3 is an email retrieval protocol that is used to downloado emails from a remote
server to a local client. This allows users to access their emailsAnswers
while offline,
Explanation
as they are
& Hints:
stored on their device after download. Addresses 10.18.10.0 through 10.18.10.63 are taken for the leftmost network.
Addresses 192 through 199 are used by the center network. Because 4 host bits are
129. What command can be used on a needed to accommodate 10 hosts, a /28 mask is needed. 10.18.10.200/28 is not a valid
Windows PC to see the IP configuration of network number. Two subnets that can be used are 10.18.10.208/28 and
that computer? 10.18.10.224/28.

o ipconfig 131. A client packet is received by a server. The packet has a destination port number of 110. What
o show interfaces service is the client requesting?
o ping
o show ip interface brief o DNS
o o DHCP
Explanation & Hint: o POP3
o SMTP
On a Windows PC, the command used to see the IP configuration is ipconfig. This
o
command provides details about the network configuration, including IP address, subnet
mask, default gateway, and DNS server information. Explanation & Hint:
130. Refer to the exhibit. Which two network The client is requesting the POP3 (Post Office Protocol version 3) service. Port 110 is
addresses can be assigned to the network the standard port number for the POP3 protocol, which is used for retrieving emails from
containing 10 hosts? Your answers should a mail server.
waste the fewest addresses, not reuse
addresses that are already assigned, and 132. Which layer of the TCP/IP model provides a route to forward messages through an internetwork?
stay within the 10.18.10.0/24 range of
addresses. (Choose two.) o transport
o application
o network access
o internet
o
Explanation & Hint:
The layer of the TCP/IP model that provides a route to forward messages through an
internetwork is the Internet layer. This layer is equivalent to the Network layer in the OSI
model and is responsible for routing the packets of data from their source to their
destination by finding the best path through the network. It includes the Internet Protocol
(IP), which is used for addressing and routing the packets.
133. What characteristic describes identity theft?

o a tunneling protocol that provides remote users with secure access into the network of an
CCNA1 v7 & v7.02 – ITNv7 – Final Exam organization
Answers 02 o the use of stolen credentials to access private data
o 10.18.10.224/27
o software that identifies fast-spreading threats
o 10.18.10.208/28
o software on a router that filters traffic based on IP addresses or applications
o
o 10.18.10.200/27
o 10.18.10.200/28 Explanation & Hint:
o
Identity theft is characterized by the use of stolen credentials to access private data.
It involves the unauthorized acquisition and use of someone else’s personal &
Explanation information,
Hint:
typically for financial gain. This can include sensitive data such The
as social
servicesecurity
provided by DNS (Domain Name System) is resolves domain names,
numbers, credit card information, or other financial account details.
such as cisco.com, into IP addresses. DNS is essentially the phonebook of the
134. What two security solutions are most internet, translating human-friendly domain names into machine-friendly IP addresses
likely to be used only in a corporate so that browsers can load internet resources.
environment? (Choose two.) 136. Which wireless technology has low-power and low-data rate requirements making it popular in IoT
environments?
o intrusion prevention systems
o antivirus software o Bluetooth
o antispyware o Zigbee
o strong passwords o WiMAX
o virtual private networks o Wi-Fi
o Answers Explanation & Hints:
Explanation & Hint: Zigbee is a specification used for low-data rate, low-power communications. It is
In a corporate environment, particularly where the security needs intended
are morefor complex
applications
andthat require short-range, low data-rates and long battery life.
the protection of sensitive data is paramount, the following two Zigbee
securityissolutions
typically are
used for industrial and Internet of Things (IoT) environments such as
most likely to be used: wireless light switches and medical device data collection.

. Intrusion Prevention Systems (IPS): These 137. are security


What appliancesdescribes
characteristic that a VPN?
monitor network and/or system activities for malicious activity. The main
functions of intrusion prevention systems are to identify malicious
o software on aactivity, log filters traffic based on IP addresses or applications
router that
information about this activity, attempt to block/stop it, and report it.
o a tunneling protocol that provides remote users with secure access into the network of an
A. Virtual Private Networks (VPNs): While VPNs can be used by individuals, in
organization
a corporate environment, they are often employedo to aenable secure
network deviceremote
that filters access and traffic coming into a network
access to the company’s internal network. This allows employees to securely
o software that identifies fast-spreading threats
connect to the corporate network from remote locations.
o
Antivirus software and antispyware are also used in corporate environments but are just
Explanation & Hint:
as likely to be found on personal computers due to the widespread need for protection
A VPN (Virtual Private Network) is best described by a tunneling protocol that
against malware and spyware. Strong passwords are a fundamental security measure
provides remote users with secure access into the network of an organization. A
expected to be used in both personal and corporate environments.
VPN allows users to send and receive data across shared or public networks as if their
computing devices were directly connected to the private network. This is done by
135. What service is provided by DNS? establishing a virtual point-to-point connection through the use of dedicated circuits or
with tunneling protocols over existing networks. It provides secure access because the
o Allows for data transfers between a connection is encrypted, which keeps the data transmitted over the VPN private.
client and a file server.
138. A network administrator is adding a new LAN to a branch office. The new LAN must support 4
o Uses encryption to secure the
connected devices. What is the smallest network mask that the network administrator can use for the
exchange of text, graphic images,
new network?
sound, and video on the web.
o A basic set of rules for exchanging
o 255.255.255.192
text, graphic images, sound, video,
o 255.255.255.248
and other multimedia files on the web.
o 255.255.255.240
o Resolves domain names, such as
o 255.255.255.224
cisco.com, into IP addresses.
o A. If the destination network is directly connected, it will then encapsulate the
Explanation & Hint: packet into the appropriate frame for the outgoing interface.
To support 4 connected devices, you need a subnet that can provide B.
at least
Finally,
4 usable
it will switch
IP the packet to that interface for delivery to the destination.
addresses for hosts. Remember that in any given subnet, two IP
There
addresses
is no need
are always
for the router to look up a next-hop address because the destination is
used up – one for the network address and one for the broadcast
directly
address,
connected,
so you need
meaning the router is directly on the same network as the destination
a subnet that provides at least 6 addresses in total. IP address and can deliver the packet directly.

Here’s how the subnet masks break down in terms of number


140. What of available
service hosts: by BOOTP?
is provided
▪ 255.255.255.192 – This is a /26 subnet mask, which allows for
o Allows for 64 addresses
data transfers in
between a client and a file server.
total, but with 2 addresses used for network and broadcast, you get 62 usable
o Legacy application that enables a diskless workstation to discover its own IP address and find a
addresses. BOOTP server on the network.
▪ 255.255.255.224 – This is a /27 subnet mask, which allowsencryption
o Uses for 32 addresses in the exchange of text, graphic images, sound, and video on the web.
to secure
total, with 30 usable addresses. o A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on
▪ 255.255.255.240 – This is a /28 subnet mask, which the allows for 16 addresses in
web.
total, with 14 usable addresses. o
▪ 255.255.255.248 – This is a /29 subnet mask, which allows for 8 addresses in
Explanation & Hint:
total, with 6 usable addresses.
BOOTP (Bootstrap Protocol) provides the service described as a legacy application that
The smallest subnet mask that will support 4 connected devices (requiring 6 addresses
enables a diskless workstation to discover its own IP address and find a BOOTP server
in total) is 255.255.255.248 or a /29 subnet mask.
on the network. BOOTP was originally designed to allow diskless workstations to boot
139. During the process of forwarding traffic, from a network server. It is able to automatically assign an IP address to networked
what will the router do immediately after computers and communicate with a BOOTP server to obtain boot files necessary to start
matching the destination IP address to a up the system.
network on a directly connected routing
table entry?
141. A client packet is received by a server. The packet has a destination port number of 21. What
service is the client requesting?
o switch the packet to the directly
connected interface
o DHCP
o discard the traffic after consulting the
o FTP
route table
o TFTP
o look up the next-hop address for the
o DNS
packet
o
o analyze the destination IP address
o Explanation & Hint:
The client is requesting the FTP (File Transfer Protocol) service. In networking, port
Explanation & Hint:
numbers are used to distinguish between different services that run over the network.
Immediately after matching the destination IP address to a network on a directly
Port 21 is the standard port number for FTP control messages. FTP is used for the
connected routing table entry, the router will switch the packet to the directly
transfer of computer files between a client and server on a computer network.
connected interface. This means that the router will forward the packet out of the
interface that is connected to the destination network.
Here’s what the other port numbers are typically used for:
Here’s a simplified sequence of steps a router typically follows when forwarding traffic:
▪ DHCP (Dynamic Host Configuration Protocol): This service usually uses port
. Receive the packet and look up the routing table to find the best match for the
67/68.
destination IP address.
▪ TFTP (Trivial File Transfer Protocol): This service uses port 69.
DNS (Domain Name System): This service utility
▪ can53.
uses port the technician use to diagnose the problem?
142. Match each description to its
o tracert
corresponding term. (Not all options are
o netstat
used.)
o nslookup
o ipconfig
Explanation:
Traceroute (tracert) is a utility that generates a list of hops that were successfully
reached along the path from source to destination.This list can provide important
verification and troubleshooting information. The ipconfig utility is used to display the IP
configuration settings on a Windows PC. The Netstat utility is used to identify which
active TCP connections are open and running on a networked host. Nslookup is a utility
that allows the user to manually query the name servers to resolve a given host name.
This utility can also be used to troubleshoot name resolution issues and to verify the
current status of the name servers.
144. What two ICMPv6 message types must be permitted through IPv6 access control lists to allow
resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)

o echo requests
o router solicitations
o router advertisements
o neighbor advertisements
o echo replies
o neighbor solicitations
o
Explanation & Hint:
CCNA1 v7 & v7.02 – ITNv7 – Final Exam In IPv6, to allow the resolution of Layer 3 addresses (IP addresses) to Layer 2
Answers 003 addresses (MAC addresses), certain ICMPv6 (Internet Control Message Protocol
Explanation & Hint: version 6) message types are essential. These messages are part of the Neighbor
o Message encoding: The process of converting information from Discovery
one formatProtocol
into (NDP), which is used in IPv6 networks for various purposes,
another acceptable for transmission. Encoding is the preparationincluding address
of message dataresolution. The two specific ICMPv6 message types that must be
for transport across a network, where data is transformed into apermitted throughforIPv6 access control lists (ACLs) for this purpose are:
suitable format
transmission over the network.
o Message encapsulation: The process of placing one message format. inside Neighbor Solicitations: These messages are used by a node to determine
another message format. Encapsulation refers to the wrapping of data with the link-layer address (MAC address) of a neighbor, or to verify that a neighbor
protocol information before network transmission, where each layer in theis OSI
still reachable via a cached link-layer address. Neighbor Solicitations are
model encapsulates the layer above it. essentially the IPv6 equivalent of ARP requests in IPv4.
A. Neighbor Advertisements: These are the responses to Neighbor
o Message sizing typically would match with a description related to determining
Solicitations. A node sends a Neighbor Advertisement to announce or confirm
the size of messages for efficient network transmission, which might involve
breaking up a long message into smaller pieces, also known as segmentation.its link-layer address to other nodes. It is analogous to an ARP reply in IPv4.
The other ICMPv6 message types you mentioned serve different purposes:
143. A technician can ping the IP address of
the web server of a remote company but
cannot successfully ping the URL address
of the same web server. Which software
▪ Echo Requests and Echo Replies: These are used the by the
ARP Ping
request
utilitysent
to test
by Host A to determine the MAC address of the default gateway
reachability in a network. While important for diagnostic purposes,
would they are
be broadcast tonot
all devices in the same broadcast domain.
specifically used for address resolution.
▪ Router Solicitations and Router Advertisements: These However,
are since
part ofyour
the question specifically mentions that Host A does not have the MAC
NDP but are used for the discovery of routers and theaddress
acquisition of various
for the default gateway and needs to communicate with Host D, it implies that
configuration settings, not for address resolution between
HostLayer
A is trying
3 andtoLayer
reach2.Host D via the default gateway. This would usually happen in a
145. Refer to the exhibit. The switches have a scenario where Host D is on a different network, and Host A needs to go through the
default configuration. Host A needs to router to reach Host D.
communicate with host D, but host A does
not have the MAC address for the default In a typical setup, the ARP request by Host A for the default gateway’s MAC address
gateway. Which network devices will would be broadcast within its own local network. In this case, the ARP request would
receive the ARP request sent by host A? reach:

▪ Hosts B and C, since they are presumably in the same local network
(broadcast domain) as Host A.
▪ Router R1, because it is the default gateway for Host A’s network.
Host D would not receive the ARP request if it’s on a different network. ARP requests
are not routed across different networks.

So, the network devices that will receive the ARP request sent by Host A are only hosts
B, C, and router R1.
146. Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate
Ethernet communication? (Choose two.) (Option A)
o integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper
o places information in the Ethernet frame that identifies which network layer protocol is being
CCNA1 encapsulated by the frame
v7 & v7.02 – ITNv7 – Final Exam Answers 03 o implements trailer with frame check sequence for error detection
o only hosts A, B, C, and D o applies source and destination MAC addresses to Ethernet frame
o only hosts A, B, and C o enables IPv4 and IPv6 to utilize the same physical medium
o only host D o
o only hosts B, C, and router R1
Explanation & Hint:
o only router R1
The LLC (Logical Link Control) sublayer of the OSI Data Link Layer performs several
o only hosts B and C
functions to facilitate Ethernet communication. Among the options you’ve listed, the two
o
functions performed at the LLC sublayer are:
Explanation & Hint:
In the scenario where Host A needs to communicate with Host D and does not have
. Places the
information in the Ethernet frame that identifies which network
MAC address for the default gateway, the behavior of the ARP (Address layer
Resolution
protocol is being encapsulated by the frame. The LLC sublayer adds
Protocol) request depends on the network setup, particularly how the hosts and information
control the in the Ethernet frame to identify the network layer protocol
router (default gateway) are connected via switches. (like IPv4 or IPv6) being used. This is crucial for the receiving system to
understand how to interpret the encapsulated data.
Given that the switches have a default configuration and assuming that Host
A. EnablesA, Host
IPv4B,and IPv6 to utilize the same physical medium. By providing
Host C, Host D, and router R1 are all connected to these switches in the multiplexing
same capabilities and specifying the network layer protocol in use, the
broadcast domain (e.g., a typical local area network setup without VLAN LLC
segmentation),
allows different network protocols (like IPv4 and IPv6) to share the same
physical network medium, such as Ethernet.
The other functions you mentioned are not specifically performed by the includes
LLC sublayer:
frame synchronization, error checking, and flow control. This function
ensures that the data transmitted over the Ethernet network is reliable and
▪ Integrates Layer 2 flows between 10 Gigabit Ethernet over synchronized.
fiber and 1
Gigabit Ethernet over copper: This is more related to Thetheother
physical
functions
layer mentioned,
and such as applying source and destination MAC
its interfaces, rather than the LLC sublayer. addresses, integrating Layer 2 flows between different Ethernet types, and implementing
▪ Implements trailer with frame check sequence for CSMA/CD error detection:
over legacy
This is
half-duplex media, are typically associated with the Media
generally a function of the MAC (Media Access Control) Access Control
sublayer (MAC)
of the Datasublayer of the Data Link Layer, not the LLC sublayer. The MAC
Link Layer, which deals with physical addressing and sublayer
error detection.
is responsible for the physical addressing and media access control
▪ Applies source and destination MAC addresses tomechanisms Ethernet frame:
in Ethernet
Again,communication.
this is a function of the MAC sublayer, not the LLC sublayer. The MAC
sublayer handles the framing of data packets,
148. including
Two pingsthewere
addition of source
issued from a host on a local network. The first ping was issued to the IP address
and destination MAC addresses. of the default gateway of the host and it failed. The second ping was issued to the IP address of a host
147. Which two functions are performed at outside the local network and it was successful. What is a possible cause for the failed ping?
the LLC sublayer of the OSI Data Link Layer
to facilitate Ethernet communication? o The default gateway is not operational.
(Choose two.) (Option B) o The default gateway device is configured with the wrong IP address.
o applies source and destination MAC o The TCP/IP stack on the default gateway is not working properly.
addresses to Ethernet frame o Security rules are applied to the default gateway device, preventing it from processing ping requests.
o places information in the Ethernet o
frame that identifies which network Explanation & Hint:
layer protocol is being encapsulated The scenario you’ve described is somewhat unusual because typically, if a ping to the
by the frame default gateway fails, pings to external hosts should also fail, as the default gateway is
o integrates Layer 2 flows between 10 the local network’s access point to outside networks. However, given the situation, one
Gigabit Ethernet over fiber and 1 plausible explanation for the failed ping to the default gateway but successful ping to an
Gigabit Ethernet over copper external host could be:
o implements CSMA/CD over legacy
shared half-duplex media ▪ Security rules are applied to the default gateway device, preventing it
o adds Ethernet control information to from processing ping requests. Some network devices, including default
network protocol data gateways, can be configured with security rules or firewalls that block certain
o types of traffic. In this case, the default gateway could be configured to ignore
Explanation & Hint: or block ICMP packets, which are used for ping commands, from hosts within
In the context of the OSI model’s Data Link Layer, particularly the Logicalthe Link Control
local network.
(LLC) sublayer, two functions relevant to Ethernet communication Theare:
other possibilities you mentioned are less likely given that a ping to an external host
was successful:
. Places information in the Ethernet frame that identifies which network
layer protocol is being encapsulated by the frame: The LLC sublayer
▪ The default is gateway is not operational: If this were the case, the host would
responsible for identifying and encapsulating network layer protocols
not be within
able totheaccess any external network, including the successful ping to an
Ethernet frame. This involves adding information to the frame which external
indicates
host.
the type of payload it is carrying, whether it’s an IP packet, an▪ ARP
The request,
default gateway device is configured with the wrong IP address:
etc. This function is crucial for the proper delivery and interpretation
Again, ofifthe
thisdata
were the case, the host would not be able to route packets to
at the receiving end. external networks.
A. Adds Ethernet control information to network protocol data: ▪ The The LLC stack on the default gateway is not working properly: Similar
TCP/IP
sublayer adds control information to the network protocol data, to which is point, this would typically prevent all external network
the first
essential for managing and controlling the communication process. This
communication.
Therefore, the most likely scenario given your description is that the default gateway has
security rules in place that specifically block ping requests from the local network.

149. What is a benefit of using cloud


computing in networking?

o Technology is integrated into every-


day appliances allowing them to
interconnect with other devices,
making them more ‘smart’ or
automated.
o Network capabilities are extended
without requiring investment in new
infrastructure, personnel, or software.
o Home networking uses existing
electrical wiring to connect devices to CCNA1 v7 & v7.02 – ITNv7 – Final Exam Answers 004
the network wherever there is an
Answers Explanation & Hints:
electrical outlet, saving the cost of
Application filters prevent access based on Layer 4 port numbers.
installing data cables.
Packet filters prevent access based on IP or MAC address.
o End users have the freedom to use
URL filters prevent access to web site URLs or content.
personal tools to access information
Stateful packet inspection prevents unsolicited incoming sessions.
and communicate across a business Network address translators translate internal IP addresses to to outside IP addresses and
network.
do not prevent network attacks.
Answers Explanation & Hints:
Cloud computing extends IT’s capabilities without requiring investment in new
151. What service is provided by SMTP?
infrastructure, training new personnel, or licensing new software. These services are
available on-demand and delivered economically to any device anywhere in the world
o Allows remote access to network devices and servers.
without compromising security or function. BYOD is about end users having the freedom
o Uses encryption to provide secure remote access to network devices and servers.
to use personal tools to access information and communicate across a business or
o Allows clients to send email to a mail server and the servers to send email to other servers.
campus network. Smart home technology is integrated into every-day appliances
o An application that allows real-time chatting among remote users.
allowing them to interconnect with other devices, making them more ‘smart’ or
o
automated. Powerline networking is a trend for home networking that uses existing
electrical wiring to connect devices to the network wherever thereExplanation & Hint:
is an electrical outlet,
saving the cost of installing data cables. SMTP (Simple Mail Transfer Protocol) provides the service that allows clients to send
email to a mail server and the servers to send email to other servers. It is a protocol
150. Match the firewall function to the type of
used for sending emails across the Internet. SMTP is involved in the process of mail
threat protection it provides to the network.
dispatch from a client’s email program to the recipient’s mail server, and also between
(Not all options are used.)
different mail servers for relaying email.

The other options you mentioned refer to different services:

▪ Allowing remote access to network devices and servers: This is generally the
role of protocols like Telnet or SSH (Secure Shell).
▪ Using encryption to provide secure remote access to at network
least 10devices
devices.
andIn IP addressing, the number of usable host addresses in a subnet
servers: This describes SSH (Secure Shell). can be calculated using the formula:
▪ An application that allows real-time chatting among remote users: This refers
to instant messaging services or applications, but it isNumber
not specifically
of usable hosts=2^n−2Number
tied to a of usable hosts=2^n−2
single protocol or service. Where n is the number of host bits. The subtraction of 2 accounts for the network
152. A client packet is received by a server. address and the broadcast address, which cannot be assigned to hosts.
The packet has a destination port number of Let’s calculate the minimum number of host bits required to support at least 10 devices:
22. What service is the client requesting?
. For a subnet mask of 255.255.255.248 (/29), there are 3 host bits (23=823=8),
o SSH which gives 6 usable addresses (8 – 2), not enough for 10 devices.
o DNS A. For a subnet mask of 255.255.255.240 (/28), there are 4 host bits
o DHCP (24=1624=16), which gives 14 usable addresses (16 – 2), enough for 10
o TFTP devices.
o B. For a subnet mask of 255.255.255.224 (/27), there are 5 host bits
(25=3225=32), which gives 30 usable addresses (32 – 2), more than needed.
Explanation & Hint:
C. For a subnet mask of 255.255.255.192 (/26), there are 6 host bits
The client is requesting SSH (Secure Shell) service. In networking, port numbers are
(26=6426=64), which gives 62 usable addresses (64 – 2), more than needed.
used to distinguish different services or processes. Port 22 is the default port for SSH,
Therefore, the smallest network mask that the network administrator can use to support
which is a protocol used for secure logins, file transfers, and other secure network
10 devices is 255.255.255.240 (/28), which provides up to 14 usable IP addresses.
services over an unsecured network.

Here’s a brief overview of the other services mentioned and their typical port numbers:

▪ DNS (Domain Name System): Usually uses port 53. It translates domain
names into IP addresses.
▪ DHCP (Dynamic Host Configuration Protocol): Typically uses port 67 for the
DHCP server and port 68 for the DHCP client. It is used for automatically
assigning IP addresses and other network configuration parameters.
▪ TFTP (Trivial File Transfer Protocol): Generally uses port 69. It’s a simple file
transfer protocol, with less functionality compared to FTP.
153. A network administrator is adding a new
LAN to a branch office. The new LAN must
support 10 connected devices. What is the
smallest network mask that the network
administrator can use for the new network?

o 255.255.255.240
o 255.255.255.224
o 255.255.255.192
o 255.255.255.248
o
Explanation & Hint:
To determine the smallest network mask that can support 10 connected devices, we
need to consider the number of host bits required in the subnet mask to accommodate

You might also like