Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Cisco CCNA questions. Question 31 Switching tables contain source MAC and the co

ID: 3557222 • Letter: C

Question

Cisco CCNA questions.

Question 31

Switching tables contain source MAC and the corresponding switch port

True

False

1 points   

Question 32

You can obtain an IP address for a switch using DHCP.

True

False

1 points   

Question 33

ATM is considered a packet swithcing service

True

False

1 points   

Question 34

SMTP uses UDP

True

False

1 points   

Question 35

SSID is an identifier for a wireless network.

True

False

1 points   

Question 36

Enterprise switches are capable of forwarding ___________ of Ethernet frames per second.

tens of thousands

thousands

millions

hundreds of thousands

1 points   

Question 37

A trunk connection between two switches located in two different rooms in the same building (select the best response):

must be fiber optic

must be crossover Ethernet cables

need to be connected via an ISP and CSU/DSU

none of the above

1 points   

Question 38

When configuring a switch from the factory you must:

All are correct

assign an IP address and a subnet mask

Configure the VLAN 1 interface

issue a no shutdown command because the interface is disabled

A, B correct

define a default gateway for the switch

1 points   

Question 39

Being cheap and using an Ethernet cable that is too long can result in:

late counter increase

none of the above

jabber

collisions

1 points   

Question 40

Select the correct response regarding subnets;

subnets must be connected by routers

two different subnets must be attached to the same switch

a subnet cannot be a private address range

none are true

1 points   

Question 41

Regarding IPv4, select the incorrect response

IP packets can be fragmented

IP packets cannot exceed 64K in length

all are correct

IP packets can be directed not to fragment

1 points   

Question 42

Select the incorrect statement regarding TCP:

all are correct

can multiplex using ports

is a connectionless transport scheme

assures reliability

1 points   

Question 43

An unauthorized AP in the workplace is referred to as:

none of the above

SWAN device

a rogue AP

war driving

1 points   

Question 44

If a switch receives an incoming frame with unknown MAC address, it (select correct answer)

switches the frame on all interfaces except the incoming interface

none of the above

ignores the frame

switches the frame on all interfaces

1 points   

Question 45

From a PCs perspective, routing is based on (select the most appropriate):

The network mask

the ARP table entry

the gateways IP address

The destination IP address

1 points   

Question 46

To find another PC on the same network, which is used (select the most appropriate)

DNS

ARP table

all of the above

gateway address

1 points   

Question 47

Select the correct response regarding the privileged EXEC mode:

enable secret actual-password stores the password in clear text

enable password actual-password will require a password to get to privileged mode

none are correct

if enable password and enable secret are used, both passwords are usable to get to privileged mode

1 points   

Question 48

192.168.0.0/26 allows for __________ hosts in the subnet

30

64

62

32

1 points   

Question 49

VoIP uses:

proprietary Layer 4 protocol

TCP for catching packet errors

UDP (no error correction)

UDP (application catches errors)

1 points   

Question 50

Jabber is defined as:

Late arrivals of frames

sending non-stop frames without breaks between frames

A problem with the Wocky protocol

excessive collisions

1 points   

Question 51

SYN requests are:

None are true

the way to let another TCP/IP app know its trying to be reached

a way of attacking a host

C and D are true

A , B and C are true

a way to synchronize sequence numbers

should be blocked

1 points   

Question 52

Hitting the MODE button on a switch allows you to determine a port(s):

all of the above

status

full or half duplex status

speed of the port

1 points   

Question 53

Switch methods include all, except for:

Fragment free

Cut through

Store and forward

all are methods

1 points   

Question 54

Regarding a transparent bridge, select the incorrect statement:

destination mac is used to decide on whether to forward a frame

STP is used to create a loop free environment

all are correct

they learn mac addresses by examining the destination mac of each frame received

1 points   

Question 55

Select the correct response regarding what makes up a socket

mac address, IP address and port number

a port number and an IP address

port, IP address and protocol

Port number and a protocol

1 points   

Question 56

Regarding SSID cloaking, which is correct?

client associates with the closest AP

clients listen for beacons on ALL channels

all are correct

Beaconing can hide the SSID

1 points   

Question 57

Select the correct statement regarding Sliding Windows

a window field in the TCP header dictates how many unacknowledged bytes can be in the connection at any time

IP cannot transport any protocol which uses Sliding Windows

UDP controls window sizes by using the Window field

window sizes are fixed

1 points   

Question 58

Select the incorrect statement(s)

A T1 can combine 24 DS0s

A T3 line is equivalent to 24 T1 lines

T1 lines are 1.544 Mbps

Voice calls require at least 64Kbps

1 points   

Question 59

From the telco/providers perspective, which of the following devices are considered CPE?

enterprise switch

none

ernterprise router

WAN switch

1 points   

Question 60

Reasons for using VLANs or the effect of using VLANs include (select all correct responses):

reduce overhead by decreasing broadcast domain sizes

makes it difficult to group users or departments

security can possibly be increased

segregate IP traffic by classification (VoIP vs data)

STP workload is increased

a.

tens of thousands

b.

thousands

c.

millions

d.

hundreds of thousands

Explanation / Answer

31. True

32. True

33. True

34. False(It uses TCP port no 25)

35. True (Used for naming wireless networks)

36. millions (72 million packets)

37. must be fiber optic

38. assign an IP address and a subnet mask

39. late counter increase

40. subnets must be connected by routers

41. IP packets can be directed not to fragment

42. is a connectionless transport scheme

43. none of the above

44. switches the frame on all interfaces

45. the gateway