1.
Refer to the exhibit. A network administrator notices that there are too many broadcasts on the network. What two steps can the network administrator take to resolve this problem? (Choose two)
Correct Answer(s)
A. Replace S2 with a router
D. Subnet the 192.168.0.0 /24 network
Explanation
The network administrator can take two steps to resolve the problem of too many broadcasts on the network. Firstly, they can replace S2 with a router. Routers can help to segment the network into separate broadcast domains, reducing the number of broadcasts that reach all devices on the network. Secondly, they can subnet the 192.168.0.0 /24 network. Subnetting allows for the creation of smaller, more efficient subnetworks, which can help to reduce the number of broadcasts by limiting their reach to specific subnets.
2.
Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology that is shown? (Choose two)
Correct Answer(s)
A. 192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network
E. 192.168.0.1 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network
Explanation
The correct answer states that 192.168.0.2 is the next-hop address used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network. This means that R3 will forward any packets destined for the 172.16.0.0 network to the next-hop address of 192.168.0.2. Similarly, the answer also states that 192.168.0.1 is the next-hop address used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network. This means that R2 will forward any packets destined for the 192.168.12.0 network to the next-hop address of 192.168.0.1.
3.
Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?
Correct Answer
D. 192.133.219.1
Explanation
The default gateway address for host A in the 192.133.219.0 network would be 192.133.219.1.
4.
Correct Answer
B. 4
5.
Refer to the exhibit. A network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to forward network packets out the network. Using the netstat -r command, the administrator would identify which address as the address to which all hosts send packets that are destined for an outside network?
Correct Answer
C. 10.10.10.6
Explanation
The correct answer is 10.10.10.6. This address is the default gateway, which is the address that all hosts on the network send packets to when they are destined for an outside network. The default gateway is responsible for forwarding these packets to the appropriate destination.
6.
In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?
Correct Answer
A. Destination network address
Explanation
The router uses the destination network address to forward data packets from one interface to another. The destination network address helps the router determine the next hop or the next router to which the packet should be sent in order to reach its intended destination. By examining the destination network address, the router can make forwarding decisions based on its routing table and determine the most appropriate path for the packet to take.
7.
What information is added during encapsulation at OSI Layer 3?
Correct Answer
D. Source and destination IP address
Explanation
During encapsulation at OSI Layer 3, the source and destination IP addresses are added. This information is crucial for routing and delivering the data packets to their intended destinations in the network. The IP address identifies the source and destination devices in the network and allows routers to forward the packets accordingly. By including the IP addresses, Layer 3 encapsulation ensures that the data is correctly routed and reaches the desired destination.
8.
In a connectionless system, which of the following is correct?
Correct Answer
B. The destination is not contacted before a packet is sent
Explanation
In a connectionless system, the destination is not contacted before a packet is sent. In connectionless communication, each packet is treated as an independent unit and does not require establishing a connection or prior communication with the destination. The sender simply sends the packet without any handshaking or acknowledgment from the destination. This approach allows for faster and more efficient transmission of data, but it also means that there is no guarantee of delivery or order of packets.
9.
Which IP packet field will prevent endless loops?
Correct Answer
D. Time-to-live
Explanation
The time-to-live field in an IP packet is used to limit the lifespan of the packet. It specifies the maximum number of hops (routers) that the packet can pass through before it is discarded. This prevents endless loops by ensuring that if a packet gets stuck in a routing loop, it will eventually reach the maximum number of hops and be dropped. Therefore, the time-to-live field helps to prevent packets from circulating indefinitely in the network.
10.
Which portion of the network layer address does a router use to forward packets?
Correct Answer
C. Network portion
Explanation
A router uses the network portion of the network layer address to forward packets. The network portion identifies the specific network to which the packet needs to be sent. By examining this portion of the address, the router can determine the appropriate next hop or interface to forward the packet towards its destination. The host portion, broadcast address, and gateway address are not used for packet forwarding by the router.
11.
If the default gateway is configured incorrectly on the host, what is the impact on communications?
Correct Answer
B. The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks
Explanation
If the default gateway is configured incorrectly on the host, it means that the host does not have the correct information about how to reach hosts on remote networks. As a result, the host can still communicate with other hosts on the local network because it does not need to use the default gateway for local communication. However, when it tries to communicate with hosts on remote networks, it will not be able to find the correct path to reach them and therefore will be unable to establish communication.
12.
What is the purpose of a default gateway?
Correct Answer
E. identifies the device that allows local network computers to communicate with devices on other networks
Explanation
A default gateway is the device that allows local network computers to communicate with devices on other networks. It acts as an intermediary between the local network and external networks, forwarding network traffic between them. Without a default gateway, computers on a local network would only be able to communicate with other devices on the same network. The default gateway enables communication with devices on different networks by routing the traffic appropriately.
13.
What type of routing uses information that is manually entered into the routing table?
Correct Answer
C. Static
Explanation
Static routing uses information that is manually entered into the routing table. Unlike dynamic routing, which automatically updates the routing table based on network changes, static routing requires the network administrator to manually configure the routes. This can be useful in small networks or in cases where the network topology is stable and changes infrequently. Static routing is less flexible than dynamic routing, but it can be more efficient and secure since it does not rely on periodic updates and is less vulnerable to routing loops or other dynamic routing issues.
14.
When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two)
Correct Answer(s)
B. The router discards the packet
E. The router forwards the packet out the interface indicated by the default route entry
Explanation
When the destination network is not listed in the routing table of a Cisco router, two possible actions that the router might take are discarding the packet and forwarding the packet out the interface indicated by the default route entry. If the router does not have a specific route for the destination network, it can choose to discard the packet. Alternatively, if there is a default route entry in the routing table, the router can forward the packet out the interface indicated by that default route entry.
15.
What are the key factors to consider when grouping hosts into a common network? (Choose three)
Correct Answer(s)
B. Purpose
E. GeograpHic location
F. Ownership
Explanation
When grouping hosts into a common network, the purpose is an important factor to consider as it helps determine the specific requirements and goals of the network. Geographic location is also crucial as it affects factors like latency, network congestion, and accessibility. Ownership is another key factor as it determines who has control and responsibility over the network. Gateways, physical addressing, and software version are not mentioned as key factors in the question.
16.
What is a component of a routing table entry?
Correct Answer
D. The next-hop address
Explanation
A component of a routing table entry is the next-hop address. The next-hop address refers to the IP address of the next router or network device that the packet should be forwarded to in order to reach its destination. Routing tables are used by routers to determine the best path for forwarding network traffic. By specifying the next-hop address, the router knows where to send the packet next in order to reach the correct destination.
17.
Which intermediary devices could be used to implement security between networks? (Choose two)
Correct Answer(s)
A. Router
D. Firewall
Explanation
Routers can be used to implement security between networks by controlling the flow of data packets and enforcing access control policies. They can filter and block certain types of traffic, preventing unauthorized access to the network. Firewalls, on the other hand, are specifically designed to protect networks from unauthorized access and potential threats. They monitor incoming and outgoing network traffic, blocking malicious or suspicious activity and preventing unauthorized access to the network. Together, routers and firewalls provide a robust security solution for network protection.
18.
What are three common problems with a large network? (Choose three)
Correct Answer(s)
B. Performance degradation
C. Security issues
E. Host identification
Explanation
A large network can experience performance degradation due to increased traffic and congestion. Security issues can arise in a large network as it becomes more difficult to monitor and protect against potential threats. Host identification can also be a problem in a large network, as it may be challenging to keep track of and manage a large number of hosts.
19.
Which three statements are true about routes and their use? (Choose three)
Correct Answer(s)
B. If the destination network is directly connected, the router forwards the packet to the destination host
D. If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router
E. If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route
Explanation
The first statement is true because if no route to the destination network is found, the packet is returned to the previous router. The second statement is true because if the destination network is directly connected, the router forwards the packet to the destination host. The third statement is true because if multiple network entries exist for the destination network, the most general route is used to forward the packet.
20.
What two characteristics are commonly associated with dynamic routing protocols? (Choose two)
Correct Answer(s)
B. Provide routers with up-to-date routing tables
D. Consume bandwidth to exchange route information
Explanation
Dynamic routing protocols provide routers with up-to-date routing tables, which means that they constantly exchange information about network changes and updates. This allows routers to adapt to changes in the network topology and choose the most efficient paths for forwarding traffic. However, this constant exchange of information consumes bandwidth as routers need to send and receive routing updates. Therefore, dynamic routing protocols require the consumption of bandwidth to exchange route information.
21.
What statement describes the purpose of a default route?
Correct Answer
D. A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists
Explanation
A default route is used by a host to transfer data to a host outside the local network when there is no other specific route available for the destination. It acts as a fallback option, allowing the host to send packets to a default gateway, which will then forward the data to the appropriate destination network. This is particularly useful when the host needs to communicate with networks that are not directly connected to it.
22.
Which protocol provides connectionless network layer services?
Correct Answer
A. IP
Explanation
IP (Internet Protocol) provides connectionless network layer services. Connectionless means that each packet is treated independently and is routed separately, without establishing a dedicated connection between the sender and receiver. IP is responsible for addressing and routing packets across the network, ensuring that they reach their intended destination. It does not guarantee the delivery or order of packets, making it a connectionless protocol. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are both transport layer protocols that rely on IP for network layer services. OSI (Open Systems Interconnection) refers to a conceptual framework for understanding network protocols and is not a specific protocol itself.
23.
What two commands can be used to view a host's routing table?
Please separate answers with a comma and a space.
Correct Answer
netstat -r, route print
route print, netstat -r
Explanation
The correct answer is "netstat -r, route print". These two commands can be used to view a host's routing table.
24.
Select three pieces of information about a route that a routing table contains.
Correct Answer(s)
A. Next-hop
C. Metric
D. Destination network address
Explanation
A routing table contains information about routes in a network. The next-hop is the IP address of the next device to which the packet should be forwarded. The metric is a value that indicates the cost or distance to reach the destination network. The destination network address is the IP address range for which the route is applicable. These three pieces of information are crucial for a router to determine the best path for forwarding packets to their destination.
25.
What kinds of problems are caused by excessive broadcast traffic on a network segment? (Choose three)
Correct Answer(s)
A. Consumes network bandwidth
B. Increases overhead on network
D. Interrupts other host functions
Explanation
Excessive broadcast traffic on a network segment can cause several problems. Firstly, it consumes network bandwidth, as all devices on the segment receive and process the broadcast messages, leading to reduced available bandwidth for other network traffic. Secondly, it increases overhead on the network, as the broadcast messages need to be processed by all devices, adding extra burden on the network resources. Lastly, excessive broadcast traffic can interrupt other host functions, as the devices spend time and resources processing the unnecessary broadcast messages instead of performing their intended tasks.
26.
Which of the following are not functions of the network layer? (Choose two)
Correct Answer(s)
C. Delivery reliability
D. Application data analysis
Explanation
The network layer is responsible for routing and addressing packets with an IP address. It is not responsible for delivery reliability or application data analysis. Delivery reliability is typically handled by the transport layer, while application data analysis is typically performed at the application layer. Encapsulation and decapsulation are processes that occur at various layers of the networking model and are not exclusive to the network layer.
27.
Which of the following are true about IP? (Choose two)
Correct Answer(s)
B. It is the most common network layer protocol
E. It encapsulates transport layer segments
Explanation
The first statement, "It is the most common network layer protocol," is true because IP (Internet Protocol) is indeed the most commonly used network layer protocol in computer networks. It is responsible for routing packets of data between different networks.
The second statement, "It encapsulates transport layer segments," is also true. IP takes the data from the transport layer (such as TCP or UDP segments) and encapsulates it into packets to be transmitted across the network.
28.
What is the name of the process of removing the OSI layer 2 information from an IP packet?
Correct Answer(s)
Decapsulation
Explanation
Decapsulation is the process of removing the OSI layer 2 information from an IP packet. This process occurs when the packet is received at the destination. During decapsulation, the layer 2 header, such as the Ethernet header, is stripped off, leaving only the layer 3 IP packet. This allows the packet to be forwarded to the appropriate destination based on the IP address. Decapsulation is the opposite of encapsulation, which is the process of adding layer 2 information to an IP packet when it is transmitted.
29.
Which of the following is true about IP?
Correct Answer
C. It is used by both routers and hosts
Explanation
IP (Internet Protocol) is a network protocol that is used by both routers and hosts. Routers use IP to forward packets between different networks, while hosts use IP to send and receive data over the internet. IP is responsible for addressing and routing packets across the network, ensuring that they reach their intended destination. It is a fundamental protocol in the TCP/IP protocol suite, which is the foundation of the internet. However, IP is not connection-oriented, meaning it does not establish a dedicated connection between sender and receiver. Additionally, IP does not use application data to determine the best path for packets, and it is not considered reliable as it does not guarantee delivery of packets.
30.
Which of the following are true about network layer encapsulation? (Choose two)
Correct Answer(s)
A. It adds a header to a segment
D. Both source and destination IP addresses are added
Explanation
Network layer encapsulation involves adding a header to a segment, which is one of the true statements. Additionally, both the source and destination IP addresses are added during network layer encapsulation. This allows the network layer to identify the source and destination of the data being transmitted.
31.
Which of the following are true about TCP and IP? (Choose two)
Correct Answer(s)
B. TCP is reliable and IP is unreliable
C. IP is connectionless and TCP is connection oriented
Explanation
TCP is reliable and IP is unreliable: TCP (Transmission Control Protocol) provides reliable, ordered, and error-checked delivery of data packets over a network. It ensures that data is delivered without loss or duplication. On the other hand, IP (Internet Protocol) is unreliable as it does not guarantee the delivery of packets. It is responsible for routing and addressing packets between different networks.
IP is connectionless and TCP is connection-oriented: IP is connectionless, meaning it does not establish a dedicated connection between the sender and receiver. Each packet is treated independently and can take different routes to reach its destination. TCP, on the other hand, is connection-oriented, meaning it establishes a reliable connection between the sender and receiver before data transmission. It ensures the ordered delivery of packets and provides flow control and congestion control mechanisms.
32.
Why is IP "media independent"?
Correct Answer
B. It works the same on all layer 1 media
Explanation
The correct answer is "It works the same on all layer 1 media." This means that IP is not dependent on any specific type of layer 1 media, such as copper wires or fiber optic cables. It is designed to work consistently and efficiently across different types of media, allowing for seamless communication and data transfer regardless of the underlying physical infrastructure.
33.
TCP is a __________ layer protocol.
Correct Answer
transport
Explanation
TCP (Transmission Control Protocol) is a transport layer protocol. The transport layer is responsible for the end-to-end delivery of data between hosts on a network. TCP provides reliable, connection-oriented communication by establishing a connection, ensuring data integrity, and handling flow control and congestion control. It breaks down large data into smaller packets, sends them over the network, and reassembles them at the receiving end. Therefore, TCP being a transport layer protocol is the correct answer.
34.
How many bits are in an IPv4 address?
Correct Answer
32
Explanation
An IPv4 address is made up of 32 bits. Each bit can have a value of either 0 or 1, resulting in a total of 2^32 possible combinations. These combinations are used to represent unique addresses for devices connected to the internet.
35.
Which of the following are true about static and dynamic routing? (Choose two)
Correct Answer(s)
C. Dynamic routing adds packet-processing overhead
E. Routers can use static and dynamic routing simultaneously
Explanation
Dynamic routing adds packet-processing overhead because routers using dynamic routing protocols need to constantly exchange routing information and update their routing tables. This requires additional processing power and network resources.
Routers can use static and dynamic routing simultaneously because they can have both static routes, which are manually configured by network administrators, and dynamic routes, which are learned and updated automatically through routing protocols. This allows for greater flexibility and control in routing decisions.
36.
What can happen when the TTL is 1? (Choose two)
Correct Answer(s)
A. The packet can be successfully delivered if it is destined for a directly connected network
C. The packet will be dropped by the next router unless that router has an interface on the destination network
Explanation
When the TTL (Time to Live) is set to 1, two things can happen. Firstly, if the packet is destined for a directly connected network, it can be successfully delivered. This means that if the packet's destination is within the same network that it originated from, it will reach its intended destination. Secondly, if the packet is not destined for a directly connected network, the next router will drop the packet unless it has an interface on the destination network. In this case, the packet will not be able to reach its destination and will be discarded by the router.
37.
IP is connectionless and will occasionally drop a packet en route to a destination IP address. If packets are dropped, how will messages be completed?
Correct Answer
D. The destination host is expecting the packet and will send a request if it does not arrive