Chapter 1. Operation of Data Networks

This chapter covers the following CCNA objectives that fall under the content area, Describe how a network works:

  • Describe the purpose and functions of various network devices.

  • Select the components required to meet a network specification.

  • Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network.

  • Describe common networked applications including web applications.

  • Describe the purpose and basic operation of the protocols in the OSI and TCP models.

  • Describe the impact of applications (Voice over IP and Video over IP) on a network.

  • Interpret network diagrams.

  • Determine the path between two hosts across a network.

  • Describe the components required for network and Internet communications.

  • Identify and correct common network problems at Layers 1, 2, 3, and 7 using a layered model approach.

  • Differentiate between LAN/WAN operation and features.

1. You are a network technician at Bubbles, Inc. Your newly appointed trainee is troubleshooting a connectivity problem on the network and would like to test application layer connectivity between devices. What command would you use?

  1. ping

  2. telnet

  3. traceroute

  4. verify

  5. trace

2. You are connecting a laptop to a Cisco router to configure it for the first time. After opening your terminal program and selecting COM1, you are prompted for the port settings. What settings should you use?

  1. 9600bps, 8 data bits, no parity, 1 stop bit, hardware flow control

  2. 9600bps, 8 data bits, no parity, 1 stop bit, no flow control

  3. 56000bps, 8 data bits, no parity, 1 stop bit, hardware flow control

  4. 56000bps, 8 data bits, no parity, 1 stop bit, no flow control

3. Which of the following is a security concern when configuring a device using Telnet?

  1. All communication is sent in clear text.

  2. Passwords are sent using reversible encryption.

  3. Passwords cannot be changed in a Telnet session.

  4. Passwords are not used during a Telnet session.

4. You are attempting to test telnet connectivity to a Cisco router in your company’s lab environment, but are unable to create a session. What should you do to resolve the problem?

  1. Use a straight-through cable to connect your computer’s COM port to the router’s console port.

  2. Use a rollover cable to connect your computer’s COM port to the router’s console port.

  3. Use a straight-through cable to connect your computer’s COM port to the router’s Ethernet port.

  4. Use a crossover cable to connect your computer’s Ethernet port to the router’s Ethernet port.

  5. Use a rollover cable to connect your computer’s Ethernet port to the router’s Ethernet port.

  6. Use a straight-through cable to connect your computer’s Ethernet port to the router’s Ethernet port.

5. Which of the following is a valid benefit of using a hub in an enterprise network?

  1. A network hub could be used to monitor network traffic from multiple sources using a packet sniffer or IDS/IPS appliance.

  2. Because it is hardware-based, a hub can transmit traffic with less latency than a network switch.

  3. A hub provides a better throughput for steady, low-bandwidth streams of traffic such as Voice over IP (VoIP ) or Video over IP (VIP).

  4. A hub provides dedicated bandwidth on a per-port basis.

6. You are preparing to discuss the foundations of network communication with a junior administrator at your company. How would you describe the characteristics of TFTP using the OSI model?

  1. TFTP is a transport layer protocol that transmits using TCP port 21.

  2. TFTP is an application layer protocol that transmits over the transport layer protocol TCP using port 21.

  3. TFTP is an application layer protocol that transmits over the transport layer protocol UDP using port 69.

  4. TFTP is a network layer protocol that transmits using UDP port 69.

7. You are using Microsoft Internet Explorer on a PC to access the Cisco website (www.cisco.com). What source port will your PC use for communication?

  1. UDP port 80.

  2. TCP port 80.

  3. The port will be randomly assigned by the operating system.

  4. Any TCP port under 1024.

8. You are a network consultant for a small, 20-user company. The company has purchased a new building and would like you to design a network infrastructure using Cisco equipment. The company will be using a cable modem Internet connection, multiple mobile laptops, and 15 stationary desktop PCs. The company would also like VPN connectivity remotely to the office. What are the most likely network components you will use? (Choose three.)

  1. Cisco switch

  2. Cisco router

  3. VLANs

  4. ASA firewall

  5. Cisco Wireless Access Point

  6. Cisco IPS Sensor

9. An interface capable of sending at a T1 speed would be transmitting data at which of the following?

  1. 1.544 Mbps

  2. 1.544 MBps

  3. 1.544 Gbps

  4. 1.544 GBps

10. Routing decisions are made at which layer of the OSI model?

  1. Application

  2. Transport

  3. Session

  4. Data Link

  5. Network

11. Which of the following protocols operate solely at Layer 2 of the OSI model? (Choose three.)

  1. 802.3 MAC

  2. IP

  3. HDLC

  4. PPP

  5. ISDN

  6. TCP

12. Which of the following are common network applications? (Choose three.)

  1. Graphics creation

  2. Email

  3. Spreadsheets

  4. Instant messaging

  5. Database

  6. Word processing

13. What is the primary purpose of a router? (Choose two.)

  1. To provide an intermediary device where network signals are transmitted from one device to another

  2. To control broadcast and multicast traffic from flooding through multiple networks

  3. To interconnect networks and provide the best path between them

  4. To protect networks using firewall capabilities implemented by using access lists

14. Refer to Figure 1.1. HostA wants to communicate with ServerB . What destination MAC address will be in the header of the packet at position A (as notated in )?

Figure 1.1. Network diagram.


net1-1.gif

  1. The MAC address of HostA

  2. The MAC address of SwitchA

  3. The MAC address of RouterA

  4. The MAC address of RouterB

  5. The MAC address of SwitchB

  6. The MAC address of ServerB

15. Refer to Figure 1.1. HostA wants to communicate with ServerB . What destination IP address will be in the header of the packet at position A (as notated in )?

  1. The IP address of HostA

  2. The IP address of SwitchA

  3. The IP address of RouterA

  4. The IP address of RouterB

  5. The IP address of SwitchB

  6. The IP address of ServerB

16. Refer to Figure 1.1. HostA wants to communicate with ServerB . What source MAC address will be in the header of the packet at position B (as notated in )?

  1. HostA ">The MAC address of HostA

  2. The MAC address of SwitchA

  3. The MAC address of RouterA

  4. The MAC address of RouterB

  5. The MAC address of SwitchB

  6. The MAC address of ServerB

17. Refer to Figure 1.2. HostA is unable to communicate with ServerB . Based on the information given in the , what is the most likely cause of the problem?

Figure 1.2. Network diagram.

full size image] net1-2.gif

  1. HostA and ServerB are on different subnets.

  2. HostA and ServerB are on the same subnet.

  3. RouterA or RouterB has an access list, which prevents HostA from reaching ServerB .

  4. Crossover cables should be replaced with straight-through cables.

18. Which of the following are valid fields in a TCP header? (Choose four.)

  1. Sequence number

  2. Source IP address

  3. Checksum

  4. Acknowledgement number

  5. Destination MAC address

  6. Destination port

19. Refer to figure 1.3. HostA issues a ping request to HostB . Which of the following outputs would accurately reflect the contents of the ARP table on HostA ?

Figure 1.3. Network diagram.

net1-3.gif

A.

C:\>arp -a
Interface: 192.168.1.10 on Interface 0x10000003
  Internet Address      Physical Address      Type
  192.168.1.1           00-0c-85-4c-05-00     dynamic

B.

C:\>arp -a
Interface: 192.168.1.10 on Interface 0x10000003
  Internet Address      Physical Address      Type
  192.168.1.1           00-0c-85-4c-05-00     dynamic
  192.168.2.1           00-0c-85-4c-05-01     dynamic
  192.168.2.10          00-b1-33-df-5e-11     dynamic

C.

C:\>arp -a
Interface: 192.168.1.10 on Interface 0x10000003
  Internet Address      Physical Address      Type
  192.168.1.1           00-0c-85-4c-05-00     dynamic
  192.168.2.10          00-b1-33-df-5e-11     dynamic

D.

C:\>arp -a
Interface: 192.168.1.10 on Interface 0x10000003
  Internet Address      Physical Address      Type
  192.168.1.11          00-0a-11-3c-34-01     dynamic

20. You are troubleshooting network connectivity issues between a Microsoft Windows client and a server. The server’s IP address recently changed and you want to clear the client’s ARP table. What command will accomplish this?

  1. arp -clear

  2. arp -a

  3. arp –c all

  4. arp –d *

21. Which of the following commands would allow a network client to test connectivity to a destination device and verify the current delay for each router traversed while making the connection?

  1. ping

  2. test

  3. tracert

  4. telnet

  5. ssh –h -d

22. Refer to figure 1.4. HostA just transmitted a certain amount of data to HostB . What does HostB ’s response indicate?

Figure 1.4. Network diagram.

net1-4.gif

  1. HostB’s response is a retransmission of data requested by HostA .

  2. HostB has indicated that a portion of HostA ’s transmission was not received and needs to be retransmitted.

  3. HostB’s response indicates the TCP session will now close.

  4. HostB’s response is normal and expected. Network communication will continue unhindered.

23. The following is a list of network functions. Enter the appropriate letter to match the network function to the corresponding OSI layer.

A = Data link layer
B = Network layer

  1. __

Provides error detection

  1. __

Routes data packets

  1. __

Finds the best path to use when delivering data

  1. __

Provides logical addressing

  1. __

Provides physical addressing

  1. __

Defines how data is formatted for transmission

24. Match the correct term to the corresponding OSI layer.

A = Physical layer
B = Data link layer
C = Network layer
D = Transport layer

  1. __ Segments

  2. __ Frames

  3. __ Bits

  4. __ Packets

25. The application layer of the TCP/IP stack corresponds to which of the following three OSI model layers? (Choose three.)

  1. __ Physical

  2. __ Transport

  3. __ Data link

  4. __ Segments

  5. __ Presentation

  6. __ Session

  7. __ Network

  8. __ Application

26. A host is assigned the IP address 10.5.62.173/27. An application on the host attempts to contact a server with the IP address 10.5.62.158/27. What is the next step in the process of network communication?

  1. The host will send an ARP message directly to the destination server to obtain its MAC address.

  2. The host will contact the IP address of its default gateway to find the MAC address for the destination server.

  3. The host will send an ARP broadcast to find the MAC address of its default gateway.

  4. The host will send an ARP broadcast to find the MAC address of the destination server.

27. Users on a specific network segment in your organization are complaining that they cannot reach the Internet. While working through the troubleshooting process, you discover that all the ports connecting to the PCs in the segment have been set to auto-negotiate speed and duplex. You also gather information from one of the end-user workstations; this information is shown in . What is the most likely cause of the problem?

Figure 1.5. Command prompt output.

net1.5.jpg

  1. All host and server connections in the network should have speed and duplex hard coded.

  2. The connectivity problems are related to an IP addressing issue.

  3. The default gateway could be blocking ICMP ping traffic.

  4. All ports should be set for 10Mbps, half-duplex connections for testing purposes.

28. Refer to figure 1.6. HostA has just sent a ping request to HostB . Based on the information given in figure 1.6 how will the switch respond?

Figure 1.6. Network diagram.

net1-6.gif

  1. The switch will forward the frame out FA0/2.

  2. The switch will flood the frame out all ports.

  3. The switch will multicast the frame only to unknown ports.

  4. The switch will flood the frame out all ports except FA0/1.

29. When data is being encapsulated, the last piece of information to be added is the _____.

  1. TCP source and destination port

  2. Destination IP address

  3. Source IP address

  4. FCS

30. Which of the following are characteristics of the Internet Protocol (IP)? (Choose three.)

  1. Best-effort delivery

  2. Reliable

  3. Uses sequence numbers

  4. Operates at the network layer of OSI

  5. Connectionless

  6. Uses a three-way handshake

QuizSolutionsCh1ICND1

*
Topic attachments
I Attachment Action Size Date Who Comment
Gifgif net1-1.gif manage 12.7 K 2013-02-11 - 22:04 JimSkon Figure 1.1
Gifgif net1-2.gif manage 15.2 K 2013-02-11 - 22:05 JimSkon Figure 1.2
Gifgif net1-3.gif manage 14.0 K 2013-02-11 - 22:05 JimSkon Figure 1.3
Gifgif net1-4.gif manage 9.6 K 2013-02-11 - 22:05 JimSkon Figure 1.4
Gifgif net1-6.gif manage 22.1 K 2013-02-11 - 22:06 JimSkon Figure 1.6
Jpgjpg net1.5.jpg manage 60.0 K 2013-02-11 - 22:04 JimSkon Figure 1.5
Topic revision: r5 - 2016-06-24 - JimSkon
 
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback