Friday, 10 August 2018

CCNA 1 V5.1 2016 ANSWERSCCNA 1 (v5.1 + v6.0) Chapter 6 Exam Answers 2018 – 100% Full

  1. Which characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications among many hosts?
    • the de-encapsulation of headers from lower layers
    • the selection of paths for and direct packets toward the destination
    • the ability to operate without regard to the data that is carried in each packet*
    • the ability to manage the data transport between processes running on hosts
  2. Explain:
    The function of the network layer protocols specifies the packet structure and processing used to carry the data from one host to another host. The actual communication data is encapsulated in the network layer PDU. The feature of its operation without regard to the data carried in each packet allows the network layer to carry packets for multiple types of communications.
  3. What are two characteristics of IP? (Choose two.)
    • does not require a dedicated end-to-end connection *
    • operates independently of the network media*
    • retransmits packets if errors occur
    • re-assembles out of order packets into the correct order at the receiver end
    • guarantees delivery of packets
  4. Explain:
    The Internet Protocol (IP) is a connectionless, best effort protocol. This means that IP requires no end-to-end connection nor does it guarantee delivery of packets. IP is also media independent, which means it operates independently of the network media carrying the packets.
  5. When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?
    • Connectionless acknowledgements are used to request retransmission.
    • Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.*
    • Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available.
    • The best-effort delivery process guarantees that all packets that are sent are received.
  6. Explain:
    When connectionless protocols are in use at a lower layer of the OSI model, upper-level protocols may need to work together on the sending and receiving hosts to account for and retransmit lost data. In some cases, this is not necessary, because for some applications a certain amount of data loss is tolerable.
  7. Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?
    • Time-to-Live*
    • Sequence Number
    • Acknowledgment Number
    • Differentiated Services
  8. Explain:
    The value of the Time-to-Live (TTL) field in the IPv4 header is used to limit the lifetime of a packet. The sending host sets the initial TTL value; which is decreased by one each time the packet is processed by a router. If the TTL field decrements to zero, the router discards the packet and sends an Internet Control Message Protocol (ICMP) Time Exceeded message to the source IP address. The Differentiated Services (DS) field is used to determine the priority of each packet. Sequence Number and Acknowledgment Number are two fields in the TCP header.
  9. What IPv4 header field identifies the upper layer protocol carried in the packet?
    • Protocol*
    • Identification
    • Version
    • Differentiated Services
  10. Explain:
    It is the Protocol field in the IP header that identifies the upper-layer protocol the packet is carrying. The Version field identifies the IP version. The Differential Services field is used for setting packet priority. The Identification field is used to reorder fragmented packets.
  11. What is one advantage that the IPv6 simplified header offers over IPv4?
    • smaller-sized header
    • little requirement for processing checksums
    • smaller-sized source and destination IP addresses
    • efficient packet handling*
  12. Explain:
    The IPv6 simplified header offers several advantages over IPv4:
    · Better routing efficiency and efficient packet handling for performance and forwarding-rate scalability
    · No requirement for processing checksums
    · Simplified and more efficient extension header mechanisms (as opposed to the IPv4 Options field)
    · A Flow Label field for per-flow processing with no need to open the transport inner packet to identify the various traffic flows
  13. Refer to the exhibit. Which route from the PC1 routing table will be used to reach PC2?
    A. 
    B. 
    C. 
    D. 
    Correct answer: A
    Explain:
    PC1 and PC2 are both on network 192.168.10.0 with mask 255.255.255.0, so there is no need to access the default gateway (entry 0.0.0.0 0.0.0.0). Entry 127.0.0.1 255.255.255.255 is the loopback interface and entry 192.168.10.10 255.255.255.255 identifies the PC1 address interface.
  14. Refer to the exhibit. R1 receives a packet destined for the IP address 192.168.2.10. Out which interface will R1 forward the packet?
    • FastEthernet0/0
    • FastEthernet0/1
    • Serial0/0/0
    • Serial0/0/1*
  15. Explain:
    If a route in the routing table points to a next hop address, the router will perform a second lookup to determine out which interface the next hop is located.
  16. What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?
    • static route
    • default route
    • directly connected route*
    • dynamic route that is learned through EIGRP
  17. Explain:
    Some of the IPv4 routing table codes include the following:
    C – directly connected
    S – static
    D – EIGRP
    * – candidate default
  18. What routing table entry has a next hop address associated with a destination network?
    • directly-connected routes
    • local routes
    • remote routes*
    • C and L source routes
  19. Explain:
    Routing table entries for remote routes will have a next hop IP address. The next hop IP address is the address of the router interface of the next device to be used to reach the destination network. Directly-connected and local routes have no next hop, because they do not require going through another router to be reached.
  20. Which statement describes a hardware feature of a Cisco 1941 router that has the default hardware configuration?
    • It does not have an AUX port.
    • It has three FastEthernet interfaces for LAN access.
    • It has two types of ports that can be used to access the console.*
    • It does not require a CPU because it relies on Compact Flash to run the IOS.
  21. Explain:
    The connections in a Cisco 1941 router include two types of ports that are used for initial configuration and command-line interface management access. The two ports are the regular RJ-45 port and a new USB Type-B (mini-B USB) connector. In addition, the router has an AUX port for remote management access, and two Gigabit Ethernet interfaces for LAN access. Compact Flash can be used increase device storage, but it does not perform the functions of the CPU, which is required for operation of the device.
  22. Following default settings, what is the next step in the router boot sequence after the IOS loads from flash?
    • Perform the POST routine.
    • Locate and load the startup-config file from NVRAM.*
    • Load the bootstrap program from ROM.
    • Load the running-config file from RAM.
  23. Explain:
    There are three major steps to the router boot sequence:
    Perform Power-On-Self-Test (POST)
    Load the IOS from Flash or TFTP server
    Load the startup configuration file from NVRAM
  24. What are two types of router interfaces? (Choose two.)
    • SVI
    • LAN*
    • DHCP
    • Telnet
    • WAN*
  25. Explain:
    Router interfaces can be grouped into two categories:
    · LAN interfaces – Used for connecting cables that terminate with LAN devices, such as computers and switches. This interface can also be used to connect routers to each other.
    · WAN interfaces – Used for connecting routers to external networks, usually over a larger geographical distance.
  26. Which two pieces of information are in the RAM of a Cisco router during normal operation? (Choose two.)
    • Cisco IOS*
    • backup IOS file
    • IP routing table*
    • basic diagnostic software
    • startup configuration file
  27. Explain:
    The Cisco IOS file is stored in flash memory and copied into RAM during the boot up. The IP routing table is also stored in RAM. The basic diagnostic software is stored in ROM and the startup configuration file is stored in NVRAM.
  28. A router boots and enters setup mode. What is the reason for this?
    • The IOS image is corrupt.
    • Cisco IOS is missing from flash memory.
    • The configuration file is missing from NVRAM.*
    • The POST process has detected hardware failure.
  29. What is the purpose of the startup configuration file on a Cisco router?
    • to facilitate the basic operation of the hardware components of a device
    • to contain the commands that are used to initially configure a router on startup*
    • to contain the configuration commands that the router IOS is currently using
    • to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS
  30. Explain:
    The startup configuration file is stored in NVRAM and contains the commands needed to initially configure a router. It also creates the running configuration file that is stored in in RAM.
  31. Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)
    • interface fastethernet 0/0
    • line vty 0 4
    • line console 0*
    • enable secret cisco
    • login *
    • password cisco *
  32. Explain:
    The three commands needed to password protect the console port are as follows:
    line console 0
    password cisco
    login
    Theinterface fastethernet 0/0 command is commonly used to access the configuration mode used to apply specific parameters such as the IP address to the Fa0/0 port. The line vty 0 4 command is used to access the configuration mode for Telnet. The0and 4 parameters specify ports 0 through 4, or a maximum of five simultaneous Telnet connections. The enable secret command is used to apply a password used on the router to access the privileged mode.
  33. Which characteristic describes an IPv6 enhancement over IPv4?
    • IPv6 addresses are based on 128-bit flat addressing as opposed to IPv4 which is based on 32-bit hierarchical addressing.
    • The IPv6 header is simpler than the IPv4 header is, which improves packet handling.*
    • Both IPv4 and IPv6 support authentication, but only IPv6 supports privacy capabilities.
    • The IPv6 address space is four times bigger than the IPv4 address space.
  34. Explain:
    IPv6 addresses are based on 128-bit hierarchical addressing, and the IPv6 header has been simplified with fewer fields, improving packet handling. IPv6 natively supports authentication and privacy capabilities as opposed to IPv4 that needs additional features to support those. The IPv6 address space is many times bigger than IPv4 address space.
  35. Open the PT Activity. The enable password on all devices is cisco.
    Perform the tasks in the activity instructions and then answer the question.

    For what reason is the failure occurring?
    • PC1 has an incorrect default gateway configured.
    • SW1 does not have a default gateway configured.*
    • The IP address of SW1 is configured in a wrong subnet.
    • PC2 has an incorrect default gateway configured.
  36. Explain:
    The ip default-gateway command is missing on the SW1 configuration. Packets from PC2 are able to successfully reach SW1, but SW1 is unable to forward reply packets beyond the local network without the ip default-gateway command issued.
  37. Match the command with the device mode at which the command is entered. (Not all options are used.)
    • Question
    • Answer
  38. Explain:
    The enable command is entered in R1> mode. The login command is entered in R1(config-line)# mode. The copy running-config startup-config command is entered in R1# mode. The ip address 192.168.4.4 255.255.255.0 command is entered in R1(config-if)# mode. The service password-encryption command is entered in global configuration mode.

    Other Questions

  39. When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?
    • connectionless acknowledgements
    • upper-layer connection-oriented protocols*
    • Network layer IP protocols
    • Transport layer UDP protocols
  40. Which IPv4 header field is responsible for defining the priority of the packet?
    • flow label
    • flags
    • differentiated services*
    • traffic class
  41. Why is NAT not needed in IPv6?
    • Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.?
    • Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.?*
    • The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.?
    • The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet.
  42. What is a service provided by the Flow Label field of the IPv6 header?
    • It limits the lifetime of a packet.
    • It identifies the total length of the IPv6 packet.
    • It classifies packets for traffic congestion control.
    • It informs network devices to maintain the same path for real-time application packets.*
  43. How do hosts ensure that their packets are directed to the correct network destination?
    • They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.?*
    • They always direct their packets to the default gateway, which will be responsible for the packet delivery.
    • They search in their own local routing table for a route to the network destination address and pass this information to the default gateway.
    • They send a query packet to the default gateway asking for the best route.
  44. Which two commands can be used on a Windows host to display the routing table? (Choose two.)
    • netstat -s
    • route print*
    • show ip route
    • netstat -r*
    • tracert
  45. During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?
    • discard the traffic after consulting the route table
    • look up the next-hop address for the packet
    • switch the packet to the directly connected interface*
    • analyze the destination IP address
  46. A technician is configuring a router that is actively running on the network. Suddenly, power to the router is lost. If the technician has not saved the configuration, which two types of information will be lost? (Choose two.)
    • Cisco IOS image file
    • routing table*
    • bootstrap file
    • ARP cache*
    • startup configuration
  47. Which two interfaces will allow access via the VTY lines to configure the router? (Choose two.)
    • aux interfaces
    • LAN interfaces *
    • WAN interfaces*
    • console interfaces
    • USB interfaces
  48. Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)
    • running configuration
    • IOS image file *
    • startup configuration*
    • POST diagnostics
  49. When would the Cisco IOS image held in ROM be used to boot the router?
    • during a file transfer operation
    • during a normal boot process
    • when the full IOS cannot be found*
    • when the running configuration directs the router to do this
  50. After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router reboots. What command should be issued?
    • copy running-config flash
    • copy startup-config flash
    • copy running-config startup-config *
    • reload*
    • copy startup-config running-config
  51. Which three commands are used to set up a password for a person who attaches a cable to a new router so that an initial configuration can be performed? (Choose three.)
    • interface fastethernet 0/0
    • line vty 0 4
    • line console 0*
    • enable secret cisco
    • login *
    • password cisco*
  52. Which statement about router interfaces is true?
    • Router LAN interfaces are not activated by default, but router WAN interfaces are.
    • Once the no shutdown command is given, a router interface is active and operational.*
    • Commands that apply an IP address and subnet mask to an interface are entered in global configuration mode.
    • A configured and activated router interface must be connected to another device in order to operate.*
  53. Which command displays a summary chart of all router interfaces, their IP addresses, and their current operational status?
    • show ip route
    • show version
    • show interfaces
    • show ip interface brief*
  54. A technician is manually configuring a computer with the necessary IP parameters to communicate over the corporate network. The computer already has an IP address, a subnet mask, and a DNS server. What else has to be configured for Internet access?
    • the WINS server address
    • the default gateway address*
    • the MAC address
    • the domain name of the organization
  55. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?
    • The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host.
    • The packet will be sent directly to the destination host.*
    • The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host.
    • The packet will be sent only to the default gateway.
  56. Refer to the exhibit. Fill in the blank.

    A packet leaving PC-1 has to traverse 3 hops to reach PC-4.?
  57. Fill in the blank. In a router, ROM is the nonvolatile memory where the diagnostic software, the bootup instructions, and a limited IOS are stored.
  58. Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)


  59. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question or complete the task. Does the router have enough RAM and flash memory to support the new IOS?
    • The router has enough RAM and flash memory for the IOS upgrade.*
    • The router has enough RAM, but needs more flash memory for the IOS upgrade.
    • The router has enough flash memory, but needs more RAM for the IOS upgrade.
    • The router needs more RAM and more flash memory for the IOS upgrade.
  60. Match the configuration mode with the command that is available in that mode. (Not all options are used.)

    Sort elements
    enable -> R1>
    copy running-config startup-config -> R1#
    login -> R1(config-line)#
    interface fastethernet 0/0 -> R1(config)#
  61. Match field names to the IP header where they would be found. (Not all options are used)

    Sort elements
    IP v4 Header (A) -> Flags (A)
    IP v4 Header (B) -> Total Length (B)
    IP v6 Header (C) ->Traffic Class (C)
    IP v6 Header (D) -> Flow Label (D)
  62. Which type of static route that is configured on a router uses only the exit interface?
    fully specified static route
    default static route
    directly connected static route*
    recursive static route

No comments:

Post a Comment

Recent Story

Featured News

Back To Top