CCENT/CCNA Icnd1 Chapters Quiz 6 + 7

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ajeff
A
Ajeff
Community Contributor
Quizzes Created: 39 | Total Attempts: 57,932
Questions: 16 | Attempts: 910

SettingsSettingsSettings
CCENT Quizzes & Trivia

This is the fourth in a series of tests designed to help you perfect your understanding on the chapters you cover for CCENT/CCNA Icnd 1 classes. The one below covers chapter 6 and 7. Give it a try and keep an eye out for the next test on the following chapters.


Questions and Answers
  • 1. 

    Which of the following header fields identify which TCP/IP application gets data received by the computer?

    • A.

      Ethernet Type

    • B.

      SNAP Protocol Type

    • C.

      IP Protocol Field

    • D.

      TCP Port Number

    • E.

      UDP Port Number

    Correct Answer(s)
    D. TCP Port Number
    E. UDP Port Number
    Explanation
    TCP Port Number and UDP Port Number are header fields that identify which TCP/IP application gets data received by the computer. When data is received by the computer, the TCP/IP protocol stack uses these port numbers to determine which application or process the data should be delivered to. TCP and UDP are transport layer protocols, and the port numbers provide a way to differentiate between different applications running on the same computer.

    Rate this question:

  • 2. 

    Which of the following are not typical functions of TCP?

    • A.

      Windowing

    • B.

      Error recovery

    • C.

      Routing

    • D.

      Multiplexing using port numbers

    • E.

      Encryption

    Correct Answer(s)
    C. Routing
    E. Encryption
    Explanation
    TCP (Transmission Control Protocol) is a reliable and connection-oriented protocol that operates at the transport layer of the TCP/IP model. It is responsible for ensuring the reliable delivery of data between two hosts. The functions of TCP include windowing, error recovery, multiplexing using port numbers, and encryption. However, routing is not a typical function of TCP. Routing is handled by the network layer protocols, such as IP (Internet Protocol), which is responsible for determining the best path for data packets to reach their destination. Encryption, on the other hand, is typically handled by higher-level protocols or applications, such as TLS (Transport Layer Security).

    Rate this question:

  • 3. 

    Which of the following functions is performed by both TCP and UDP?

    • A.

      Windowing

    • B.

      Error recovery

    • C.

      Multiplexing using port numbers

    • D.

      Routing

    • E.

      Encryption

    Correct Answer
    C. Multiplexing using port numbers
    Explanation
    Both TCP and UDP perform the function of Multiplexing using port numbers. This means that they use port numbers to identify different applications or services running on a device. By using port numbers, TCP and UDP are able to send and receive data to the correct application or service on the receiving device. This allows for multiple applications to communicate simultaneously over a network using the same IP address.

    Rate this question:

  • 4. 

    What do you call data that includes the Layer 4 protocol header, and data given to Layer 4 by the upper layers, not including any headers and trailers from Layers 1 to 3?

    • A.

      L4PDU

    • B.

      L3PDU

    • C.

      Segment

    • D.

      Packet

    • E.

      Frame

    Correct Answer(s)
    A. L4PDU
    C. Segment
    Explanation
    The correct answer is L4PDU, Segment. In networking, data is organized into different layers, with each layer adding its own header and sometimes trailer to the data. The Layer 4 Protocol Data Unit (L4PDU) refers to the data that includes the Layer 4 protocol header, as well as the data provided by the upper layers. This data does not include any headers and trailers from Layers 1 to 3. A segment, on the other hand, is the term used to describe the data unit at the Transport Layer (Layer 4). Therefore, both L4PDU and segment are correct terms for this type of data.

    Rate this question:

  • 5. 

    In the URL http://www.fredsco.com/name.html, which part identifies the web server?

    • A.

      Http

    • B.

      Www.fredsco.com

    • C.

      Fredsco.com

    • D.

      Http://www.fredsco.com

    • E.

      The file name.html includes the hostname.

    Correct Answer
    B. Www.fredsco.com
    Explanation
    The part "www.fredsco.com" in the URL identifies the web server. The "www" is a subdomain, "fredsco" is the domain name, and ".com" is the top-level domain. This combination represents the specific web server where the file "name.html" is located.

    Rate this question:

  • 6. 

    When comparing VoIP with an HTTP-based mission-critical business application, which of the following statements are accurate about the quality of service needed from the network?

    • A.

      VoIP needs better (lower) packet loss.

    • B.

      HTTP needs less bandwidth.

    • C.

      HTTP needs better (lower) jitter.

    • D.

      VoIP needs better (lower) delay.

    Correct Answer(s)
    A. VoIP needs better (lower) packet loss.
    D. VoIP needs better (lower) delay.
    Explanation
    VoIP, or Voice over Internet Protocol, is a real-time communication technology that requires a stable and reliable network connection. To ensure good call quality, VoIP needs better (lower) packet loss, meaning that fewer data packets are lost during transmission. Additionally, VoIP needs better (lower) delay, as any delay in transmitting the voice data can cause noticeable disruptions or delays in the conversation. On the other hand, HTTP, which is a protocol used for web browsing and non-real-time applications, requires less bandwidth and better (lower) jitter, which refers to the variation in delay between packets.

    Rate this question:

  • 7. 

    Which of the following is a device or function whose most notable feature is to examine trends over time to recognize different known attacks as compared to a list of common attack signatures?

    • A.

      VPN

    • B.

      Firewall

    • C.

      IDS

    • D.

      NAC

    Correct Answer
    C. IDS
    Explanation
    An Intrusion Detection System (IDS) is a device or function that is designed to examine trends over time and compare them to a list of common attack signatures. It is used to recognize different known attacks and alert the system administrators or security personnel about potential security breaches. IDS helps in detecting and preventing unauthorized access, network misuse, and other malicious activities by analyzing network traffic patterns and identifying suspicious behavior. It is different from a Virtual Private Network (VPN), Firewall, and Network Access Control (NAC) in terms of its primary function and purpose.

    Rate this question:

  • 8. 

    Which of the following is a device or function whose most notable feature is to encrypt packets before they pass through the Internet?

    • A.

      VPN

    • B.

      Firewall

    • C.

      IDS

    • D.

      NAC

    Correct Answer
    A. VPN
    Explanation
    A VPN (Virtual Private Network) is a device or function that encrypts packets before they pass through the Internet. It creates a secure and private connection between the user's device and the network, ensuring that data transmitted over the internet is protected from unauthorized access. VPNs are commonly used to enhance online privacy, bypass geographical restrictions, and secure remote connections.

    Rate this question:

  • 9. 

    Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address?

    • A.

      It compares the unicast destination address to the bridging, or MAC address, table.

    • B.

      It compares the unicast source address to the bridging, or MAC address, table.

    • C.

      It forwards the frame out all interfaces in the same VLAN except for the incoming interface.

    • D.

      It compares the destination IP address to the destination MAC address.

    • E.

      It compares the frame’s incoming interface to the source MAC entry in the MAC address table.

    Correct Answer
    A. It compares the unicast destination address to the bridging, or MAC address, table.
    Explanation
    A switch decides to forward a frame destined for a known unicast MAC address by comparing the unicast destination address to the bridging, or MAC address, table. This table contains a list of MAC addresses and the corresponding interfaces that the switch has learned through previous frame transmissions. By comparing the destination address of the incoming frame to the entries in the MAC address table, the switch can determine the appropriate interface to forward the frame to, ensuring that it reaches its intended destination.

    Rate this question:

  • 10. 

    Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address?

    • A.

      It compares the unicast destination address to the bridging, or MAC address, table.

    • B.

      It compares the unicast source address to the bridging, or MAC address, table.

    • C.

      It forwards the frame out all interfaces in the same VLAN except for the incoming interface.

    • D.

      It compares the destination IP address to the destination MAC address.

    • E.

      It compares the frame’s incoming interface to the source MAC entry in the MAC address table.

    Correct Answer
    C. It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
    Explanation
    When a LAN switch receives a frame destined for a broadcast MAC address, it needs to decide how to forward it. In this case, the correct answer states that the switch will forward the frame out all interfaces in the same VLAN except for the incoming interface. This means that the switch will send the frame to all devices within the same VLAN, except for the port it received the frame from. This ensures that all devices in the VLAN receive the broadcast message, allowing for efficient communication within the network.

    Rate this question:

  • 11. 

    Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address?

    • A.

      It forwards out all interfaces in the same VLAN except for the incoming interface.

    • B.

      It forwards the frame out the one interface identified by the matching entry in the MAC address table.

    • C.

      It compares the destination IP address to the destination MAC address.

    • D.

      It compares the frame’s incoming interface to the source MAC entry in the MAC address table.

    Correct Answer
    A. It forwards out all interfaces in the same VLAN except for the incoming interface.
    Explanation
    A switch forwards out all interfaces in the same VLAN except for the incoming interface when it receives a frame destined for an unknown unicast address. This means that the switch will broadcast the frame to all other devices in the same VLAN, in the hopes that the intended recipient will pick it up.

    Rate this question:

  • 12. 

    Which of the following comparisons does a switch make when deciding whether a new MAC address should be added to its bridging table?

    • A.

      It compares the unicast destination address to the bridging, or MAC address, table.

    • B.

      It compares the unicast source address to the bridging, or MAC address, table.

    • C.

      It compares the VLAN ID to the bridging, or MAC address, table.

    • D.

      It compares the destination IP address’s ARP cache entry to the bridging, or MAC address, table.

    Correct Answer
    B. It compares the unicast source address to the bridging, or MAC address, table.
    Explanation
    A switch compares the unicast source address to the bridging, or MAC address, table to decide whether a new MAC address should be added. The source address is the address of the device that sent the packet, and the bridging table keeps track of the MAC addresses of devices connected to the switch. By comparing the source address to the table, the switch can determine if the MAC address is already known and if it needs to add it to the table for future reference.

    Rate this question:

  • 13. 

    PC1, with MAC address 1111.1111.1111, is connected to Switch SW1’s Fa0/1 interface. PC2, with MAC address 2222.2222.2222, is connected to SW1’s Fa0/2 interface. PC3, with MAC address 3333.3333.3333, connects to SW1’s Fa0/3 interface. The switch begins with no dynamically learned MAC addresses, followed by PC1 sending a frame with a destination address of 2222.2222.2222. If the next frame to reach the switch is a frame sent by PC3, destined for PC2’s MAC address of 2222.2222.2222, which of the following are true?

    • A.

      The switch forwards the frame out interface Fa0/1.

    • B.

      The switch forwards the frame out interface Fa0/2.

    • C.

      The switch forwards the frame out interface Fa0/3.

    • D.

      The switch discards (filters) the frame.

    Correct Answer(s)
    A. The switch forwards the frame out interface Fa0/1.
    B. The switch forwards the frame out interface Fa0/2.
    Explanation
    The switch forwards the frame out interface Fa0/1 because it has learned that the MAC address 2222.2222.2222 is connected to that interface. The switch also forwards the frame out interface Fa0/2 because it has learned that the MAC address 2222.2222.2222 is connected to that interface.

    Rate this question:

  • 14. 

    Which of the following devices would be in the same collision domain as PC1?

    • A.

      PC2, which is separated from PC1 by an Ethernet hub

    • B.

      PC3, which is separated from PC1 by a transparent bridge

    • C.

      PC4, which is separated from PC1 by an Ethernet switch

    • D.

      PC5, which is separated from PC1 by a router

    Correct Answer
    A. PC2, which is separated from PC1 by an Ethernet hub
    Explanation
    PC2 and PC1 would be in the same collision domain because they are both connected to the same Ethernet hub. In a collision domain, devices share the same network segment and can potentially collide when trying to transmit data at the same time. An Ethernet hub is a simple device that broadcasts all incoming data to all connected devices, so any data transmitted by PC1 would be received by PC2, and vice versa.

    Rate this question:

  • 15. 

    Which of the following devices would be in the same broadcast domain as PC1?

    • A.

      PC2, which is separated from PC1 by an Ethernet hub

    • B.

      PC3, which is separated from PC1 by a transparent bridge

    • C.

      PC4, which is separated from PC1 by an Ethernet switch

    • D.

      PC5, which is separated from PC1 by a router

    Correct Answer(s)
    A. PC2, which is separated from PC1 by an Ethernet hub
    B. PC3, which is separated from PC1 by a transparent bridge
    C. PC4, which is separated from PC1 by an Ethernet switch
    Explanation
    PC2, PC3, and PC4 would be in the same broadcast domain as PC1 because they are all connected by Layer 2 devices (Ethernet hub, transparent bridge, and Ethernet switch) which do not separate broadcast traffic. These devices forward broadcast packets to all connected devices in the same network. On the other hand, PC5 is separated from PC1 by a router, which operates at Layer 3 and creates different broadcast domains. Therefore, PC5 would not be in the same broadcast domain as PC1.

    Rate this question:

  • 16. 

    Which of the following Ethernet standards support a maximum cable length of longer than 100 meters?

    • A.

      100BASE-TX

    • B.

      1000BASE-LX

    • C.

      1000BASE-T

    • D.

      100BASE-FX

    Correct Answer(s)
    B. 1000BASE-LX
    D. 100BASE-FX
    Explanation
    1000BASE-LX and 100BASE-FX are the Ethernet standards that support a maximum cable length longer than 100 meters. 1000BASE-LX is a Gigabit Ethernet standard that can support cable lengths of up to 10 kilometers using single-mode fiber optic cables. 100BASE-FX is a Fast Ethernet standard that can support cable lengths of up to 2 kilometers using multi-mode fiber optic cables. 100BASE-TX and 1000BASE-T both have a maximum cable length of 100 meters, so they do not support longer cable lengths.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 16, 2009
    Quiz Created by
    Ajeff
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.