CCNA Exploration 1 Chapter 7

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Sharangkan
S
Sharangkan
Community Contributor
Quizzes Created: 3 | Total Attempts: 812
Questions: 20 | Attempts: 242

SettingsSettingsSettings
CCNA Exploration 1 Chapter 7 - Quiz

The Cisco Certified Network Associate offers a wide variety of programmes and courses in order to let you pick the right route to your career in Networking, and today we’ll be looking at the CCNA Exploration curriculum. Think you know enough to get most of the questions correct?


Questions and Answers
  • 1. 

    What is a function of the data link layer?

    • A.

      Provides the formatting of data

    • B.

      Provides end-to-end delivery of data between hosts

    • C.

      Provides delivery of data between two applications

    • D.

      Provides for the exchange data over a common local media

    Correct Answer
    D. Provides for the exchange data over a common local media
    Explanation
    The data link layer provides for the exchange of data over a common local media. This layer is responsible for establishing and terminating connections between nodes on a network, as well as for controlling the flow of data and detecting and correcting errors in the transmission. It also handles the addressing of devices on the network and the encapsulation and de-encapsulation of data packets. Overall, the data link layer ensures reliable and efficient communication between devices connected to the same local network.

    Rate this question:

  • 2. 

    Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit?

    • A.

      All three networks use CSMA/CA

    • B.

      None of the networks require media access control

    • C.

      Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.

    • D.

      Network 1 uses CSMA/CA and Network 2 uses CSMA/CD

    • E.

      Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.

    Correct Answer
    C. Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.
    Explanation
    The correct answer is "Network 1 uses CSMA/CD and Network 3 uses CSMA/CA." This is because the question asks for the media access control methods used by the networks in the exhibit. CSMA/CD (Carrier Sense Multiple Access/Collision Detection) is a media access control method used by Network 1, while CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is used by Network 3.

    Rate this question:

  • 3. 

    Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer?

    • A.

      LLC

    • B.

      MAC

    • C.

      HDLC

    • D.

      NIC

    Correct Answer
    B. MAC
    Explanation
    The Media Access Control (MAC) sublayer of the data link layer prepares a signal to be transmitted at the physical layer. It is responsible for controlling access to the physical transmission medium, such as Ethernet cables or wireless channels. The MAC sublayer handles tasks such as framing, addressing, and error checking before passing the signal to the physical layer for transmission.

    Rate this question:

  • 4. 

    Which three factors should be considered when implementing a Layer 2 protocol in a network? (Choose three.)

    • A.

      The Layer 3 protocol selected

    • B.

      The geographic scope of the network

    • C.

      The PDU defined by the transport layer

    • D.

      The physical layer implementation

    • E.

      The number of hosts to be interconnected

    Correct Answer(s)
    B. The geograpHic scope of the network
    D. The pHysical layer implementation
    E. The number of hosts to be interconnected
    Explanation
    When implementing a Layer 2 protocol in a network, three factors that should be considered are the geographic scope of the network, the physical layer implementation, and the number of hosts to be interconnected. The geographic scope of the network is important because it determines the distance over which the Layer 2 protocol needs to operate effectively. The physical layer implementation is crucial as it determines the type of media and hardware that will be used for communication. The number of hosts to be interconnected is significant because it affects the scalability and performance of the Layer 2 protocol.

    Rate this question:

  • 5. 

    What statements are true regarding addresses found at each layer of the OSI model? (Choose two.)

    • A.

      Layer 2 may identify devices by a physical address burned into the network card

    • B.

      Layer 2 identifies the applications that are communicating

    • C.

      Layer 3 represents a hierarchical addressing scheme

    • D.

      Layer 4 directs communication to the proper destination network

    • E.

      Layer 4 addresses are used by intermediary devices to forward data

    Correct Answer(s)
    A. Layer 2 may identify devices by a pHysical address burned into the network card
    C. Layer 3 represents a hierarchical addressing scheme
    Explanation
    Layer 2 may identify devices by a physical address burned into the network card. This is true because Layer 2, also known as the Data Link Layer, uses MAC addresses to identify devices on a local network. These MAC addresses are unique and are assigned to the network card during manufacturing.

    Layer 3 represents a hierarchical addressing scheme. This is true because Layer 3, also known as the Network Layer, uses IP addresses to provide a hierarchical addressing scheme. IP addresses are hierarchical in nature, with different levels of network and host portions, allowing for efficient routing and addressing in large networks.

    Rate this question:

  • 6. 

    What is true concerning physical and logical topologies?

    • A.

      The logical topology is always the same as the physical topology.

    • B.

      Physical topologies are concerned with how a network transfers frames.

    • C.

      Physical signal paths are defined by Data Link layer protocols.

    • D.

      Logical topologies consist of virtual connections between nodes.

    Correct Answer
    D. Logical topologies consist of virtual connections between nodes.
    Explanation
    The correct answer is that logical topologies consist of virtual connections between nodes. This means that the way nodes are connected in a logical topology does not necessarily reflect the physical layout of the network. Logical topologies are concerned with how data is transmitted between nodes and can be different from the physical topology, which focuses on the physical arrangement of devices and cables. The physical topology determines how frames are transferred, while the logical topology determines the logical paths through which data travels.

    Rate this question:

  • 7. 

    What two facts are true when a device is moved from one network or subnet to another? (Choose two.)

    • A.

      The Layer 2 address must be reassigned.

    • B.

      The default gateway address should not be changed.

    • C.

      The device will still operate at the same Layer 2 address.

    • D.

      Applications and services will need additional port numbers assigned.

    • E.

      The Layer 3 address must be reassigned to allow communications to the new network.

    Correct Answer(s)
    C. The device will still operate at the same Layer 2 address.
    E. The Layer 3 address must be reassigned to allow communications to the new network.
    Explanation
    When a device is moved from one network or subnet to another, two facts are true. First, the device will still operate at the same Layer 2 address. This means that the MAC address of the device remains the same even after the move. Second, the Layer 3 address must be reassigned to allow communications to the new network. This means that the IP address of the device needs to be changed to be compatible with the new network or subnet.

    Rate this question:

  • 8. 

    What is a primary purpose of encapsulating packets into frames?

    • A.

      Provide routes across the internetwork

    • B.

      Format the data for presentation to the user

    • C.

      Facilitate the entry and exit of data on media

    • D.

      Identify the services to which transported data is associated

    Correct Answer
    C. Facilitate the entry and exit of data on media
    Explanation
    The primary purpose of encapsulating packets into frames is to facilitate the entry and exit of data on media. Encapsulation involves adding a header and a trailer to the packet, creating a frame. This frame is then transmitted over the network media. The header contains information such as source and destination addresses, while the trailer is used for error checking. By encapsulating packets into frames, the data can be efficiently transmitted and received by devices on the network media.

    Rate this question:

  • 9. 

    What is a characteristic of a logical point-to-point topology?

    • A.

      The nodes are physically connected.

    • B.

      The physical arrangement of the nodes is restricted.

    • C.

      The media access control protocol can be very simple.

    • D.

      The data link layer protocol used over the link requires a large frame header.

    Correct Answer
    C. The media access control protocol can be very simple.
    Explanation
    A characteristic of a logical point-to-point topology is that the media access control protocol can be very simple. In a point-to-point topology, there is a direct connection between two nodes, allowing for a dedicated communication channel. This eliminates the need for complex media access control protocols, as there is no contention for the network resources. Each node can transmit data without interference, resulting in a simpler protocol.

    Rate this question:

  • 10. 

    What is the primary purpose of the trailer in a data link layer frame?

    • A.

      Define the logical topology

    • B.

      Provide media access control

    • C.

      Support frame error detection

    • D.

      Carry routing information for the frame

    Correct Answer
    C. Support frame error detection
    Explanation
    The primary purpose of the trailer in a data link layer frame is to support frame error detection. The trailer contains a checksum or cyclic redundancy check (CRC) value that is used to verify the integrity of the frame during transmission. By comparing the calculated checksum with the one in the trailer, errors can be detected, such as missing or flipped bits. This allows the receiving device to identify if any errors occurred during transmission and request retransmission if necessary.

    Rate this question:

  • 11. 

    Which statements describe the logical token-passing topology? (Choose two.)

    • A.

      Network usage is on a first come, first serve basis.

    • B.

      Computers are allowed to transmit data only when they possess a token.

    • C.

      Data from a host is received by all other hosts.

    • D.

      Electronic tokens are passed sequentially to each other.

    • E.

      Token passing networks have problems with high collision rates.

    Correct Answer(s)
    B. Computers are allowed to transmit data only when they possess a token.
    D. Electronic tokens are passed sequentially to each other.
    Explanation
    In a logical token-passing topology, computers are allowed to transmit data only when they possess a token. This means that each computer on the network must wait for its turn to possess the token before it can transmit data. Additionally, electronic tokens are passed sequentially to each other, ensuring that each computer gets a fair chance to transmit data. This topology helps regulate network usage on a first come, first serve basis and ensures that data from a host is received by all other hosts. However, it does not mention anything about high collision rates, so it cannot be concluded that token passing networks have problems with high collision rates.

    Rate this question:

  • 12. 

     What are three characteristics of valid Ethernet Layer 2 addresses? (Choose three.)

    • A.

      They are 48 binary bits in length.

    • B.

      They are considered physical addresses.

    • C.

      They are generally represented in hexadecimal format.

    • D.

      They consist of four eight-bit octets of binary numbers.

    • E.

      They are used to determine the data path through the network.

    • F.

      They must be changed when an Ethernet device is added or moved within the network.

    Correct Answer(s)
    A. They are 48 binary bits in length.
    B. They are considered pHysical addresses.
    C. They are generally represented in hexadecimal format.
    Explanation
    Ethernet Layer 2 addresses, also known as MAC addresses, are 48 binary bits in length. They are considered physical addresses because they are assigned to the network interface card (NIC) of a device. These addresses are generally represented in hexadecimal format for easier readability.

    Rate this question:

  • 13. 

    Refer to the exhibit. How many unique CRC calculations will take place as traffic routes from the PC to the laptop?

    • A.

      1

    • B.

      2

    • C.

      4

    • D.

      8

    • E.

      16

    Correct Answer
    D. 8
    Explanation
    The given exhibit is not available, so it is difficult to provide a specific explanation for the answer. However, in general, the number of unique CRC calculations depends on the number of different paths or routes the traffic can take from the PC to the laptop. If there are 8 different paths, then 8 unique CRC calculations would be needed.

    Rate this question:

  • 14. 

    What determines the method of media access control? (Choose two.)

    • A.

      Network layer addressing

    • B.

      Media sharing

    • C.

      Application processes

    • D.

      Logical topology

    • E.

      Intermediary device function

    Correct Answer(s)
    B. Media sharing
    D. Logical topology
    Explanation
    The method of media access control is determined by two factors: media sharing and logical topology. Media sharing refers to how multiple devices share the same physical medium, such as Ethernet cables or wireless frequencies. The method used to allocate access to the media among the devices is crucial in preventing collisions and ensuring efficient communication. Logical topology, on the other hand, defines how devices are connected and communicate with each other in a network. Different logical topologies, such as bus, ring, or star, may require different methods of media access control to facilitate communication effectively.

    Rate this question:

  • 15. 

    Refer to the exhibit. A frame is being sent from the PC to the laptop. Which source MAC and IP addresses will be included in the frame as it leaves RouterB? (Choose two.)

    • A.

      Source MAC – PC

    • B.

      Source MAC – S0/0 on RouterA

    • C.

      Source MAC – Fa0/1 on RouterB

    • D.

      Source IP – PC

    • E.

      Source IP – S0/0 on RouterA

    • F.

      Source IP – Fa0/1 of RouterB

    Correct Answer(s)
    C. Source MAC – Fa0/1 on RouterB
    D. Source IP – PC
    Explanation
    The frame is being sent from the PC to the laptop, so the source MAC address will be the MAC address of the PC. As the frame leaves RouterB, the source MAC address will be the MAC address of the outgoing interface on RouterB, which is Fa0/1. Similarly, the source IP address will be the IP address of the PC. Therefore, the source MAC address will be Fa0/1 on RouterB and the source IP address will be the IP address of the PC.

    Rate this question:

  • 16. 

    What is the purpose of the preamble in an Ethernet frame?

    • A.

      Is used as a pad for data

    • B.

      Identifies the source address

    • C.

      Marks the end of timing information

    • D.

      Is used for timing synchronization with alternating patterns of ones and zeros

    Correct Answer
    D. Is used for timing synchronization with alternating patterns of ones and zeros
    Explanation
    The purpose of the preamble in an Ethernet frame is to provide timing synchronization with alternating patterns of ones and zeros. This allows the receiving device to synchronize its clock with the sender's clock and accurately decode the incoming data. The preamble helps in establishing the correct timing for the data transmission and ensures that the receiver can accurately interpret the bits being transmitted.

    Rate this question:

  • 17. 

    Which options are properties of contention-based media access for a shared media? (Choose three.)

    • A.

      Non-deterministic

    • B.

      Less overhead

    • C.

      One station transmits at a time

    • D.

      Collisions exist

    • E.

      Devices must wait their turn

    • F.

      Token passing

    Correct Answer(s)
    A. Non-deterministic
    B. Less overhead
    D. Collisions exist
    Explanation
    Contention-based media access is a method used in shared media networks where multiple devices compete for access to the medium. In this approach, there is no predetermined order for transmitting data, making it non-deterministic. This lack of determinism allows for flexibility and adaptability in the network. Additionally, contention-based media access typically has less overhead compared to other methods, as it does not require complex protocols or token management. However, collisions can occur in contention-based media access when multiple devices attempt to transmit simultaneously, leading to a decrease in network performance. Therefore, the correct options for properties of contention-based media access in this question are non-deterministic, less overhead, and collisions exist.

    Rate this question:

  • 18. 

    A network administrator has been asked to provide a graphic representation of exactly where the company network wiring and equipment are located in the building. What is this type of drawing?

    • A.

      Logical topology

    • B.

      Physical topology

    • C.

      Cable path

    • D.

      Wiring grid

    • E.

      Access topology

    Correct Answer
    B. pHysical topology
    Explanation
    A physical topology is a type of drawing that provides a graphic representation of the exact location of the company's network wiring and equipment in the building. It shows the physical layout and connections of devices such as routers, switches, and cables. This drawing helps the network administrator to understand and manage the physical infrastructure of the network, including the placement of equipment and the paths of cables.

    Rate this question:

  • 19. 

    What is true regarding media access control? (Choose three.)

    • A.

      Ethernet utilizes CSMA/CD

    • B.

      Defined as placement of data frames on the media

    • C.

      Contention-based access is also known as deterministic

    • D.

      802.11 utilizes CSMA/CD

    • E.

      Data Link layer protocols define the rules for access to different media

    • F.

      Controlled access contains data collisions

    Correct Answer(s)
    A. Ethernet utilizes CSMA/CD
    B. Defined as placement of data frames on the media
    E. Data Link layer protocols define the rules for access to different media
    Explanation
    CSMA/CD is a media access control method used in Ethernet networks. It stands for Carrier Sense Multiple Access with Collision Detection. This method allows devices to listen to the network before transmitting data, and if the network is clear, they can send their data. If two devices attempt to transmit at the same time and a collision occurs, they both stop transmitting and wait for a random amount of time before trying again. This helps to minimize data collisions and ensure fair access to the network. Data Link layer protocols, such as Ethernet, define the rules for accessing different types of media, including how data frames are placed on the media.

    Rate this question:

  • 20. 

    Refer to the exhibit. Assuming that the network in the exhibit is converged meaning the routing tables and ARP tables are complete, which MAC address will Host A place in the destination address field of Ethernet frames destined for http://www.server?

    • A.

      00-1c-41-ab-c0-00

    • B.

      00-0c-85-cf-65-c0

    • C.

      00-0c-85-cf-65-c1

    • D.

      00-12-3f-32-05-af

    Correct Answer
    B. 00-0c-85-cf-65-c0
    Explanation
    Host A will place the MAC address 00-0c-85-cf-65-c0 in the destination address field of Ethernet frames destined for http://www.server.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 18, 2012
    Quiz Created by
    Sharangkan
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.