You are on page 1of 27

Networking Basics Exam

1. Which statement describes the use of powerline networking technology?


• A device connects to an existing home LAN using an adapter and an
existing electrical outlet.
• New “smart” electrical cabling is used to extend an existing home LAN.
• Wireless access points use powerline adapters to distribute data through
the home LAN.
• A home LAN is installed without the use of physical cabling.
Explanation: Powerline networking adds the ability to connect a device to the
network using an adapter wherever there is an electrical outlet. The network uses
existing electrical wiring to send data. It is not a replacement for physical cabling, but
it can add functionality in places where wireless access points cannot be used or
cannot reach devices.
2. Which wireless RF band do IEEE 802.11b/g devices use?
• 60 GHz
• 2.4 GHz
• 900 MHz
• 5 GHz
Explanation: 900 MHz is an FCC wireless technology that was used before
development of the 802.11 standards. 900 MHz devices have a larger coverage range
than the higher frequencies have and do not require line of sight between devices.
802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices operate at 5
GHz, and 802.11ad devices operate at 60 GHz.
3. Refer to the exhibit. Which term correctly identifies the device type that is
included in the area B?
Networking Basics Course Final Exam 3
• end
• transfer
• source
• intermediary
Explanation: Routers and switches are intermediary devices. End devices consist of
PCs, laptops, and servers. They also include printers, VoIP phones, security cameras,
and hand-held devices.
4. What is a disadvantage of deploying a peer-to-peer network model?
• lack of centralized administration
• high cost
• difficulty of setup
• high degree of complexity
Explanation: The simplest peer-to-peer network consists of two computers that are
directly connected to each other through the use of a wired or wireless connection.
The primary disadvantages of a peer-to-peer network are its lack of central
administration, minimal security, and its lack of scalability.
5. Which three steps must be completed to manually connect an Android or IOS
device to a secured wireless network? (Choose three.)
• Change the MAC address.
• Set the IP address.
• Enter the network SSID.
• Activate the Bluetooth antenna.
• Input the authentication password.
• Choose the correct security type.
Explanation: In order to connect an Android or IOS device to a Wi-Fi network
manually, perform these steps:
Enter the network SSID of the wireless network.
Choose the security type used by the wireless network.
Input the password to authenticate successfully.
6. A company is contemplating whether to use a client/server or a peer-to-peer
network. What are three characteristics of a peer-to-peer network? (Choose three.)
• better security
• scalable
• easy to create
• better device performance when acting as both client and server
• less cost to implement
• lacks centralized administration
Explanation: Because network devices and dedicated servers are not required, peer-
to-peer networks are easy to create, less complex, and have lower costs. Peer-to-
peer networks also have no centralized administration. They are less secure, not
scalable, and those devices acting as both client and server may perform slower.
7. Which type of device provides an Internet connection through the use of a phone
jack?
• satellite modem
• Wi-Fi AP
• DSL modem
• cable modem
Explanation: SL technology uses the existing telephone network. For that reason, a
DSL modem commonly has an RJ-11 phone
8. A traveling sales representative uses a cell phone to interact with the home office
and customers, track samples, make sales calls, log mileage, and upload/download
data while at a hotel. Which internet connectivity method would be a preferred
method to use on the mobile device due to the low cost?
• cellular
• Wi-Fi
• DSL
• cable
Explanation: Mobile devices typically use either the cellular network or a Wi-Fi
network to connect to the internet. The Wi-Fi connection is preferred because it uses
less battery power and is free in many places.
9. A user is configuring a wireless access point and wants to prevent any neighbors
from discovering the network. What action does the user need to take?
• Configure DMZ settings.
• Disable SSID broadcast.
• Configure a DNS server.
• Enable WPA encryption.
Explanation: Disabling SSID broadcast prevents the access point from announcing the
name of the network. Enabling WPA encryption, configuring DMZ settings, and
configuring a DNS server will accomplish different tasks, but the name of the network
will still be announced.
10. A tourist is traveling through the countryside and needs to connect to the
internet from a laptop. However, the laptop only has Wi-Fi and Ethernet
connections. The tourist has a smartphone with 3G/4G connectivity. What can the
tourist do to allow the laptop to connect to the internet?
• Enable tethering and create a hotspot.
• Use the smartphone to access web pages and then pass the web pages to
the laptop.
• Use the smartphone to access the internet through a satellite connection
and then share that connection with the laptop.
• Use an Ethernet cable to connect the smartphone to the laptop.
Explanation: Many cell phones have the ability to connect to other devices through a
feature called tethering. The connection can be made using Wi-Fi, Bluetooth, or a
USB cable. Once a device is connected, it is able to use the cellular connection of the
phone to access the internet. When a cellular phone allows Wi-Fi devices to connect
and use the mobile data network, this is called a hotspot.
11. What layer is responsible for routing messages through an internetwork in the
TCP/IP model?
• network access
• session
• transport
• internet
Explanation: The TCP/IP model consists of four layers: application, transport,
internet, and network access. Of these four layers, it is the internet layer that is
responsible for routing messages. The session layer is not part of the TCP/IP model
but is rather part of the OSI model.
12. What will a Cisco LAN switch do if it receives an incoming frame and the
destination MAC address is not listed in the MAC address table?
• Send the frame to the default gateway address.
• Drop the frame.
• Forward the frame out all ports except the port where the frame is
received.
• Use ARP to resolve the port that is related to the frame.
Explanation: A LAN switch populates the MAC address table based on source MAC
addresses. When a switch receives an incoming frame with a destination MAC
address that is not listed in the MAC address table, the switch forwards the frame out
all ports except for the ingress port of the frame. When the destination device
responds, the switch adds the source MAC address and the port on which it was
received to the MAC address table.
13. What process involves placing one message format inside of another message
format?
• flow control
• encapsulation
• encoding
• segmentation
Explanation: When a message is placed inside of another message, this is known as
encapsulation. On networks, encapsulation takes place when one protocol data unit
is carried inside of the data field of the next lower protocol data unit.
14. A cable installation company is trying to convince a customer to use fiber-optic
cabling instead of copper cables for a particular job. What is one advantage of using
fiber-optic cabling compared to copper cabling?
• The installation skills required for fiber-optic cabling are lower.
• Fiber-optic cabling can transmit signals without attenuation.
• Fiber-optic cabling is completely immune to EMI and RFI.
• The cost of fiber-optic connectors is lower.
Explanation: When comparing UTP cabling with fiber-optic cabling, note the
following: fiber-optic connectors have higher costs, technician installation skills
required are higher, fiber bandwidth supported is higher, and fiber-optic cabling is
immune to RFI and EMI, and can transmit signals with less attenuation.
15. What data encoding technology is used in copper cables?
• electrical pulses
• modulation of specific frequencies of electromagnetic waves
• modulation of light rays
• pulses of light
Explanation: Data is transmitted across a network on media. Modern networks
primarily use three types of media to interconnect devices:
• Metal wires within cables (copper cable, such as twisted-pair and coaxial
cable) – Data is encoded into electrical impulses.
• Glass or plastic fibers within cables (fiber-optic cable) – Data is encoded
into pulses of light.
• Wireless transmission – Data is encoded via modulation of specific
frequencies of electromagnetic waves.
16. What information is added to the switch table from incoming frames?
• destination IP address and incoming port number
• source MAC address and incoming port number
• source IP address and incoming port number
• destination MAC address and incoming port number
Explanation: A switch “learns” or builds the MAC address table based on the source
MAC address as a frame comes into the switch. A switch forwards the frame onward
based on the destination MAC address.
17. At which layer of the OSI model would a logical address be added during
encapsulation?
• network layer
• physical layer
• transport layer
• data link layer
Explanation: Logical addresses, also known as IP addresses, are added at the network
layer. Physical addresses are edded at the data link layer. Port addresses are added at
the transport layer. No addresses are added at the physical layer.
18. Which type of network model describes the functions that must be completed
at a particular layer, but does not specify exactly how each protocol should work?
• reference model
• hierarchical design model
• protocol model
• TCP/IP model
Explanation: There are two common types of network communication models:
Protocol model – This model closely matches the structure of a particular protocol
suite and describes the functions that occur at each layer of protocols within the
suite. The TCP/IP model is an example of a protocol model.
Reference model – The primary purpose is to aid in a clearer understanding of the
functions and processes necessary for network communications.This type of model
does not specify exactly how a function should be accomplished. The OSI model is an
example of a reference model.
19. Which two criteria are used to help select a network medium for a network?
(Choose two.)
• the environment where the selected medium is to be installed
• the cost of the end devices that are used in the network
• the number of intermediate devices that are installed in the network
• the distance the selected medium can successfully carry a signal
• the types of data that need to be prioritized
Explanation: Criteria for choosing a network medium include the following:
The distance the selected medium can successfully carry a signal in the environment
in which the selected medium is to be installed
The amount of data and the speed at which the data must be transmitted
The cost of the medium and its installation
20. Which scenario is suitable for deploying twisted-pair cables?
• to connect network devices in backbone networks
• to connect a TV set to the wall plug at home
• to connect data centers with high bandwidth requirements over long
distances
• to connect PC workstations in an office
Explanation: Ethernet technology generally uses twisted-pair cables to interconnect
devices. Because Ethernet is the foundation for most local networks, twisted-pair is
the most commonly used type of network cabling for connecting office computers.
21. Refer to the exhibit. How many bits are represented by each group of four
hexadecimal values contained between the colons in an IPv6 address?

• 16
• 64
• 4
• 32
• 8
Explanation: The four hexadecimal values contained in a hextet represent 16 bits.
There are eight hextets in an IPv6 address that make up the total 128 bits of the
address. (16 x 8 = 128).
22. Which network design has the fewest broadcast domains?

Explanation: Routers break networks into separate broadcast domains. Each LAN is a
broadcast domain. The correct answer has only one broadcast domain. All other
answers have two broadcast domains.
23. A company uses DHCP servers to dynamically assign IPv4 addresses to employee
workstations. The address lease duration is set as 5 days. An employee returns to
the office after an absence of one week. When the employee boots the
workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3
destination addresses will the message contain?
• FF-FF-FF-FF-FF-FF and 255.255.255.255
• MAC address of the DHCP server and 255.255.255.255
• FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server
• both MAC and IPv4 addresses of the DHCP server
Explanation: When the lease of a dynamically assigned IPv4 address has expired, a
workstation will send a DHCPDISCOVER message to start the process of obtaining a
valid IP address. Because the workstation does not know the addresses of DHCP
servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-
FF-FF-FF and 255.255.255.255.
24. What are two characteristics of multicast transmission? (Choose two.)
• The source address of a multicast transmission is in the range of 224.0.0.0
to 224.0.0.255.
• Multicast transmission can be used by routers to exchange routing
information.
• A single packet can be sent to a group of hosts.
• Multicast messages map lower layer addresses to upper layer addresses.
• Computers use multicast transmission to request IPv4 addresses.
Explanation: Broadcast messages consist of single packets that are sent to all hosts
on a network segment. These types of messages are used to request IPv4 addresses,
and map upper layer addresses to lower layer addresses. A multicast transmission is a
single packet sent to a group of hosts and is used by routing protocols, such as OSPF
and RIPv2, to exchange routes. The address range 224.0.0.0 to 224.0.0.255 is
reserved for link-local addresses to reach multicast groups on a local network.
25. Which three types of nodes should be assigned static IP addresses on a
network? (Choose three.)
• desktop PCs
• printers
• mobile laptops
• gateways
• tablets
• servers
Explanation: Servers, printers, and intermediary devices, such as routers, switches,
and access points should have statically assigned IP addresses so that they are
accessible to users and available for remote management.
26. What benefit does DHCP provide to a network?
• DHCP allows users to refer to locations by a name rather than an IP
address.
• Hosts always have the same IP address and are therefore always
reachable.
• Hosts can connect to the network and get an IP address without manual
configuration.
• Duplicate addresses cannot occur on a network that issues dynamic
addresses using DHCP and has static assignments.
Explanation: DHCP provides automatic IP address configuration to hosts on a
network. Hosts will be dynamically assigned an address when they connect to the
network, although not necessarily the same address each time they connect. If there
are static and dynamic addresses used together on the network there could still be
the possibility of address conflicts. DNS can be used in conjunction with DHCP to
allow users to communicate using names rather than IP addresses.
27. Which three addresses are valid public addresses? (Choose three.)
• 198.133.219.17
• 128.107.12.117
• 172.31.1.25
• 10.15.250.5
• 64.104.78.227
• 192.168.1.245
Explanation: The ranges of private IPv4 addresses are as folllows:
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
28. Which number grouping is a valid IPv6 address?
• 1234:1230::1238::1299:1000::
• 1b10::1100::2001::2900::ab11::1102::0000::2900
• 2001:0db8:3c55:0015:1010:0000:abcd:ff13
• 12aa::1298:1200::129b
Explanation: An IPv6 address is made up of 128 bits represented in hexadecimal
numbers.There are two rules that help reduce the number of digits needed to
represent an IPv6 address.
• Rule 1 – Omit leading zeros in any 16-bit section.
• Rule 2 – Replace any single group of consecutive zeros with a double
colon (::). This can only be used once within an IPv6 address.
29. Refer to the exhibit. A newly purchased client laptop has just connected to the
local area network. The local area network is using a wireless router that is
providing dynamic addressing as shown. Which IP address does the laptop use as a
destination address when requesting a dynamically assigned address?
• 192.168.0.100
• 255.255.255.255
• 192.168.0.255
• 255.255.255.0
• 192.168.0.1
Explanation: When a new client device is installed on a network that uses dynamic IP
addressing, the client will send out a DHCP request message with the destination IPv4
address of 255.255.255.255.
30. Refer to the exhibit. A technician is attempting to configure the IPv6 address
2001:db8::1111::0200 on a device. Why does the device return an error message
that indicates the address is not valid?

Networking Basics Course Final Exam 30


• The IPv6 address notation is incorrect.
• IPv6 is not implemented on this network.
• The device already is configured with an IPv4 address.
• The address is already in use on the network.
Explanation: The IP address entered by the technician is in an invalid notation format
because it contains two instances of the double colon (::). When using a shortened
IPv6 notation, a double colon can only be used once.
31. What type of route is indicated by the code C in an IPv4 routing table on a Cisco
router?
• directly connected route
• default route
• dynamic route learned from another router
• static route
Explanation: Some of the IPv4 routing table codes include the following:
C – directly connected
S – static
D – EIGRP
* – candidate default
32. A small accounting office is setting up a wireless network to connect end
devices and to provide internet access. In which two scenarios does a wireless
router perform Network Address Translation (NAT)? (Choose two.)
• when a host is sending packets to the ISP in order to request a speed
increase for Internet services
• when a host is sending packets to a local server in order to update the
network media settings and music playlists
• when a host is sending packets to a remote site owned by the
manufacturer of the wireless router in order to request a digital copy of
the device manual
• when a host is sending a print job to a network printer on the LAN
• when a host is sending HTTP packets to the wireless router in order to
update the network addressing of the LAN
Explanation: A wireless router will perform Network Address Translation (NAT)
whenever a private (local) source IPv4 address is translated to a public (global)
address.
33. Refer to the exhibit. A switch with a default configuration connects four hosts.
The ARP table for host A is shown. What happens when host A wants to send an IP
packet to host D?

• Host A sends out the packet to the switch. The switch sends the packet
only to the host D, which in turn responds.
• Host D sends an ARP request to host A.
• Host A sends an ARP request to the MAC address of host D.
• Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host
connected to the switch receives the broadcast and host D responds
with its MAC address.
Explanation: Whenever the destination MAC address is not contained within the ARP
table of the originating host, the host (host A in this example) will send a Layer 2
broadcast that has a destination MAC address of FF:FF:FF:FF:FF:FF. All devices on the
same network receive this broadcast. Host D will respond to this broadcast.
34. Open the PT activity. Perform the tasks in the activity instructions and then
answer the question. Which IP address should be used as the default gateway
address on PC0?

Networking Basics Course Final Exam


• 192.168.2.10
• 192.168.1.1
• 192.168.2.5
• 192.168.1.2
Explanation: The default gateway address identifies a network device through which
end user devices on the LAN can communicate with hosts on remote networks. The
default gateway is usually the router interface attached to the LAN.
35. Refer to the exhibit. The IP address of which device interface should be used as
the default gateway setting of host H1?

• R1: G0/0
• R2: S0/0/1
• R1: S0/0/0
• R2: S0/0/0
Explanation: The default gateway for host H1 is the router interface that is attached
to the LAN that H1 is a member of. In this case, that is the G0/0 interface of R1. H1
should be configured with the IP address of that interface in its addressing settings.
R1 will provide routing services to packets from H1 that need to be forwarded to
remote networks.
36. A network administrator has a multi-floor LAN to monitor and maintain.
Through careful monitoring, the administrator has noticed a large amount of
broadcast traffic slowing the network. Which device would you use to best solve
this problem?
• switch
• router
• host
• server
Explanation: All hosts within a single LAN belong to one broadcast domain. As the
number of hosts increase, it could cause more traffic on the segment and may slow
network performance. To solve the performance issue, a router would be the device
used to segment the single LAN into multiple LANs.
37. An employee is having connectivity issues. Why might a network technician try
to ping the default gateway from the employee laptop?
• to verify connectivity with the device that provides access to remote
networks
• to verify that an IP address was provided by the DHCP server
• to determine if the laptop address is included in the DNS server
• to verify that the SVI interface on the switch is configured correctly
Explanation: The default gateway address is usually the address of the router
interface. The router provides access to remote networks, so a successful ping to the
default gateway would mean that the laptop is able to communicate with the router.
38. Refer to the exhibit. PC1 issues an ARP request because it needs to send a
packet to PC3. In this scenario, what will happen next?

• SW1 will send an ARP reply with its Fa0/1 MAC address.
• RT1 will send an ARP reply with its own Fa0/0 MAC address.
• RT1 will send an ARP reply with the PC3 MAC address.
• RT1 will forward the ARP request to PC3.
• RT1 will send an ARP reply with its own Fa0/1 MAC address.
Explanation: When a network device has to communicate with a device on another
network, it broadcasts an ARP request asking for the default gateway MAC address.
The default gateway (RT1) unicasts an ARP reply with the Fa0/0 MAC address.
39. Refer to the exhibit. Host H2 sends a unicast message to host H6. Which
destination IP address is contained in the header of the packet when it reaches host
H6?

• the IP address assigned to the network adapter on host H2


• the IP address assigned to the network adapter on host H6
• the IP address of the FastEthernet0/1 interface on router R1
• the IP address of the FastEthernet0/0 interface on router R1
Explanation: When host H2 sends the packet to host H6, the source IP address is the
address assigned to the network adapter on host H2. The destination address of the
packet is the IP address assigned to the network adapter on host H6. The source and
destination IP addresses do not change as the packet is forwarded through the
routers. When the packet arrives at H6 the destination address of the packet is the
address assigned to the network adapter on H6.
40. Refer to the exhibit. Host A sends a data packet to host B. What will be the
addressing information of the data packet when it reaches host B?
41. Which command would a technician use to display network connections on a
host computer?
• ipconfig
• nslookup
• tracert
• netstat
Explanation: The netstat command is a network utility that can be used to display
active TCP connections that are open and running on a networked host.
42. How are port numbers used in the TCP/IP encapsulation process?
• Source port and destination port numbers are randomly generated.
• Source port numbers and destination port numbers are not necessary
when UDP is the transport layer protocol being used for the
communication.
• If multiple conversations occur that are using the same service, the
source port number is used to track the separate conversations.
• Destination port numbers are assigned automatically and cannot be
changed.
Explanation: Both UDP and TCP use port numbers to provide a unique identifier for
each conversation. Source port numbers are randomly generated and are used to
track different conversations. Destination port numbers identify specific services by
using either a default port number for the service or a port number that is assigned
manually by a system administrator.
43. Two pings were issued from a host on a local network. The first ping was issued
to the IP address of the default gateway of the host and it failed. The second ping
was issued to the IP address of a host outside the local network and it was
successful. What is a possible cause for the failed ping?
• The default gateway is not operational.
• The TCP/IP stack on the default gateway is not working properly.
• Security rules are applied to the default gateway device, preventing it
from processing ping requests.
• The default gateway device is configured with the wrong IP address.
Explanation: If the ping from one host to another host on a remote network is
successful, this indicates that the default gateway is operational. In this scenario, if a
ping from one host to the default gateway failed, it is possible that some security
features are applied to the router interface, preventing it from responding to ping
requests.
44. Open the PT activity. Perform the tasks in the activity instructions and then
answer the question. What is the code displayed on the web page?

What is the code displayed on the web page


1 file(s) 499.78 KB
Download
• Success
• Correct
• Welldone
• Configured Right
Explanation: The IP address configuration on PC0 requires the following:
• IP address – any valid host address on the LAN, except for .254
• Subnet mask – default value for the network
• Gateway – the nearest router interface
• DNS – the DNS server on the ISP network
45. A technician is troubleshooting a network connectivity problem. Pings to the
local wireless router are successful but pings to a server on the Internet are
unsuccessful. Which CLI command could assist the technician to find the location of
the networking problem?
• msconfig
• ipconfig/renew
• tracert
• ipconfig
Explanation: The tracert utlility (also known as the tracert command or tracert tool)
will enable the technician to locate the link to the server that is down. The ipconfig
command displays the computer network configuration details. The ipconfig/renew
command requests an IP address from a DHCP server. Msconfig is not a network
troubleshooting command.
46. Which two TCP header fields are used to confirm receipt of data? (Choose two.)
• FCS
• acknowledgment number
• sequence number
• preamble
• checksum
Explanation: Together the TCP sequence number and acknowledgment number fields
are used by the receiver to inform the sender of the bytes of data that the receiver
has accepted.
47. When analog voice signals are converted for use on a computer network, in
what format are they encapsulated?
• IP packets
• segments
• frames
• bits
Explanation: When Voice over iP (VoIP) is being used, analog voice signals are
translated into digital data in the form of IP packets. This translation allows the phone
call to be carried through a computer network.
48. Refer to the exhibit. An administrator is trying to troubleshoot connectivity
between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on
the displayed output, where should the administrator begin troubleshooting?

• SW1
• R1
• SW2
• PC2
• R2
Explanation: Tracert is used to trace the path a packet takes. The only successful
response was from the first device along the path on the same LAN as the sending
host. The first device is the default gateway on router R1. The administrator should
therefore start troubleshooting at R1.
49. A network technician attempts to ping www.example.net from a customer
computer, but the ping fails. Access to mapped network drives and a shared printer
are working correctly. What are two potential causes for this problem? (Choose
two.)
• The Windows domain or workgroup name that is configured on the
computer is incorrect.
• The computer has been assigned a static IP address.
• The target web server is down.
• DNS service is unavailable on the customer network.
• The HTTP protocol is not working properly on the target server.
Explanation: A ping would fail if the destination device was not operational. It would
also fail if the DNS server was unavailable to convert the URL to an IP address. The
fact that a computer had a static IP address is not a factor. Even if the target protocol
(HTTP) is not functioning, the server would still respond to a ping.
50. Open the PT activity. Perform the tasks in the activity instructions and then
answer the question. What is the IP address of this server?

• 209.165.201.4
• 192.168.10.100
• 209.165.201.3
• 192.168.10.1
Explanation: The DNS server resolves Internet names to associated IP addresses.
51. Which wireless technology allows a customer to connect to a payment terminal
in the store with a smartphone?
• Wi-Fi
• GPS
• NFC
• Bluetooth
Explanation: NFC, or Near Field Communications, is a wireless technology for
communication between devices at extremenly short distances and is used in
contactless payment systems.
52. What are two methods typically used on a mobile device to provide internet
connectivity? (Choose two.)
• Bluetooth
• cellular
• NFC
• GPS
• Wi-Fi
Explanation: Mobile devices commonly use Wi-Fi and cellular to connect to the
internet. The cellular connection uses the cellular data network for a fee. The Wi-Fi
connection uses an 802.11 wireless network in the area to connect to the internet.
53. What information does an Ethernet switch examine and use to build its address
table?
• destination IP address
• destination MAC address
• source IP address
• source MAC address
Explanation: An Ethernet switch examines the source MAC address of an incoming
frame. If the source MAC address is not in the MAC address table, the switch will add
it to the table with the associated ingress Ethernet port.
54. Which two OSI model layers have the same functionality as two layers of the
TCP/IP model? (Choose two.)
• transport
• network
• data link
• session
• physical
Explanation: The OSI transport layer is functionally equivalent to the TCP/IP transport
layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI
data link and physical layers together are equivalent to the TCP/IP network access
layer. The OSI session layer (with the presentation layer) is included within the TCP/IP
application layer.
55. What is the shortest valid representation of the IPv6 address
2001:0DB8:0000:1470:0000:0000:0000:0200?
• 2001:DB8::1470::200
• 2001:0DB8:0:147::02
• 2001:0DB8::1470:0:0:0:2
• 2001:DB8:0:1470::200
Explanation: A double colon (::) can replace any single, contiguous string of one or
more 16-bit segments (hextets) consisting of all 0s, and can only be used once per
IPv6 address. Any leading 0s (zeros) in any 16-bit section or hextet can be omitted.
56. A college has five campuses. Each campus has IP phones installed. Each campus
has an assigned IP address range. For example, one campus has IP addresses that
start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college
has standardized that IP phones are assigned IP addresses that have the number 4X
in the third octet. For example, at one campus the address ranges used with phones
include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to
create this IP addressing scheme? (Choose two.)
• personnel type
• device type
• geographic location
• department
• support model
Explanation: The IP address design being used is by geographic location (for example,
one campus is 10.1, another campus 10.2, another campus 10.3). The other design
criterion is that the next octet number designates IP phones, or a specific device type,
with numbers starting with 4, but which can include other numbers. Other devices
that might get a designation inside this octet could be printers, PCs, and access
points.
57. Refer to the exhibit. If all devices are using a subnet mask of 255.255.255.0,
which laptop would have an IP address with the same network number as the
server?

• B
• A
• C
Explanation: The subnet mask shows which part of the IP address is the network
number. Because all the devices have a subnet mask of 255.255.255.0, the first three
sets of numbers in each IP address indicate the network number. The server and
laptop C both have network numbers of 192.168.3.0.
58. For what purpose are IPv4 addresses utilized?
• An IPv4 address is burned into the network card to uniquely identify a
device.
• An IPv4 address is used to identify the number of IP networks available.
• An IPv4 address is used to uniquely identify a device on an IP network.
• An IPv4 address is used to uniquely identify the application that requested
the information from a remote device.
Explanation: A MAC address is burned into a NIC to uniquely identify a device. A port
number is used to uniquely identify the application that requested information. The
subnet mask identifies how many hosts can be on a network and the network
number. There is not really any parameter that identifies the number of free IP
networks.
59. A user is setting up a home wireless network. A global address is to be used in
NAT translations for traffic flowing through the wireless router. How is this global
address assigned?
• The wireless router will act as a DHCP client in order to receive global
addressing from the ISP.
• The default gateway IP address of the LAN device is used as the global
address for NAT translations through the wireless router.
• The network administrator will choose an available IP address from the
LAN and configure the global addressing of the wireless router.
• The host devices will select an unused IP address on the LAN for
performing NAT through the wireless router.
Explanation: The public (global) address used in NAT is commonly the public IP
address that resides on the external facing interface of the wireless router.This IP
address is commonly provided via DHCP from the ISP.
60. Match the protocol function to the description while taking into consideration
that a network client is visiting a web site.

Explanation: Place the options in the following order:

A user requests a website by typing in its name. Domain Name System

A service that allows workers to send messages to each other over the
Internet. email

A user uploads new files to his or her website. file transfer

Dynamic Host
A workstation gets its IP address automatically. Configuration

A user types in a URL and a page loads in the client browser. web service

A network technician accesses a network device securely from a


remote site. SSH
61. Refer to the exhibit. PC1 needs to resolve the host name of the web server into
an IP address by using DNS. What destination IP address and destination port
number will PC1 assign to the DNS query packet?
Networking Basics: Course Completion Assessment & Survey Q61
• 192.168.20.3 port 53
• 192.168.10.1 port 53
• 192.168.20.3 port 80
• 192.168.20.2 port 80
• 192.168.20.2 port 53
Explanation: To resolve the host name to an IP address a host can send a query to a
DNS server. The transport layer port number for DNS is port 53.
62. How many bits are in an IPv4 address?
• 32
• 256
• 128
• 64
Explanation: An IPv4 address is comprised of 4 octets of binary digits, each containing
8 bits, resulting in a 32-bit address.
63. When a host sends a packet, how does it determine if the destination of the
packet is on the same local network or on a remote network?
• It compares the source and destination MAC addresses.
• It queries the DNS server with the destination IP address.
• It checks to see if the default gateway is configured.
• It uses the subnet mask to compare the source and destination IP
address.
Explanation: When a host sends a packet, it uses the subnet mask to compare the
source IPv4 address and the destination IPv4 address. If the network bits match, both
the source and destination host are on the same local network. Otherwise, the
destination host is on a remote network.
64. Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP
request to obtain a destination MAC address. Which MAC address will PC1 receive
in the ARP reply?

• the MAC address of the G0/0 interface on R2


• the MAC address of S2
• the MAC address of S1
• the MAC address of File_server1
• the MAC address of the G0/0 interface on R1
Explanation: PC1 must have a MAC address to use as a destination Layer 2 address.
PC1 will send an ARP request as a broadcast and R1 will send back an ARP reply with
its G0/0 interface MAC address. PC1 can then forward the packet to the MAC address
of the default gateway, R1.

You might also like