CCENT/CCNA Icnd1 Chapters Quiz 6 + 7

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ajeff
A
Ajeff
Community Contributor
Quizzes Created: 39 | Total Attempts: 59,871
| Attempts: 910 | Questions: 16
Please wait...
Question 1 / 16
0 %
0/100
Score 0/100
1. Which of the following devices would be in the same collision domain as PC1?

Explanation

PC2 and PC1 would be in the same collision domain because they are both connected to the same Ethernet hub. In a collision domain, devices share the same network segment and can potentially collide when trying to transmit data at the same time. An Ethernet hub is a simple device that broadcasts all incoming data to all connected devices, so any data transmitted by PC1 would be received by PC2, and vice versa.

Submit
Please wait...
About This Quiz
Icnd1 Quizzes & Trivia

This is the fourth in a series of tests designed to help you perfect your understanding on the chapters you cover for CCENT/CCNA Icnd 1 classes. The one... see morebelow covers chapter 6 and 7. Give it a try and keep an eye out for the next test on the following chapters. see less

2. Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address?

Explanation

A switch forwards out all interfaces in the same VLAN except for the incoming interface when it receives a frame destined for an unknown unicast address. This means that the switch will broadcast the frame to all other devices in the same VLAN, in the hopes that the intended recipient will pick it up.

Submit
3. Which of the following is a device or function whose most notable feature is to encrypt packets before they pass through the Internet?

Explanation

A VPN (Virtual Private Network) is a device or function that encrypts packets before they pass through the Internet. It creates a secure and private connection between the user's device and the network, ensuring that data transmitted over the internet is protected from unauthorized access. VPNs are commonly used to enhance online privacy, bypass geographical restrictions, and secure remote connections.

Submit
4. Which of the following functions is performed by both TCP and UDP?

Explanation

Both TCP and UDP perform the function of Multiplexing using port numbers. This means that they use port numbers to identify different applications or services running on a device. By using port numbers, TCP and UDP are able to send and receive data to the correct application or service on the receiving device. This allows for multiple applications to communicate simultaneously over a network using the same IP address.

Submit
5. Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address?

Explanation

When a LAN switch receives a frame destined for a broadcast MAC address, it needs to decide how to forward it. In this case, the correct answer states that the switch will forward the frame out all interfaces in the same VLAN except for the incoming interface. This means that the switch will send the frame to all devices within the same VLAN, except for the port it received the frame from. This ensures that all devices in the VLAN receive the broadcast message, allowing for efficient communication within the network.

Submit
6. Which of the following header fields identify which TCP/IP application gets data received by the computer?

Explanation

TCP Port Number and UDP Port Number are header fields that identify which TCP/IP application gets data received by the computer. When data is received by the computer, the TCP/IP protocol stack uses these port numbers to determine which application or process the data should be delivered to. TCP and UDP are transport layer protocols, and the port numbers provide a way to differentiate between different applications running on the same computer.

Submit
7. In the URL https://www.fredsco.com/name.html, which part identifies the web server?

Explanation

The part "www.fredsco.com" in the URL identifies the web server. The "www" is a subdomain, "fredsco" is the domain name, and ".com" is the top-level domain. This combination represents the specific web server where the file "name.html" is located.

Submit
8. Which of the following is a device or function whose most notable feature is to examine trends over time to recognize different known attacks as compared to a list of common attack signatures?

Explanation

An Intrusion Detection System (IDS) is a device or function that is designed to examine trends over time and compare them to a list of common attack signatures. It is used to recognize different known attacks and alert the system administrators or security personnel about potential security breaches. IDS helps in detecting and preventing unauthorized access, network misuse, and other malicious activities by analyzing network traffic patterns and identifying suspicious behavior. It is different from a Virtual Private Network (VPN), Firewall, and Network Access Control (NAC) in terms of its primary function and purpose.

Submit
9. What do you call data that includes the Layer 4 protocol header, and data given to Layer 4 by the upper layers, not including any headers and trailers from Layers 1 to 3?

Explanation

The correct answer is L4PDU, Segment. In networking, data is organized into different layers, with each layer adding its own header and sometimes trailer to the data. The Layer 4 Protocol Data Unit (L4PDU) refers to the data that includes the Layer 4 protocol header, as well as the data provided by the upper layers. This data does not include any headers and trailers from Layers 1 to 3. A segment, on the other hand, is the term used to describe the data unit at the Transport Layer (Layer 4). Therefore, both L4PDU and segment are correct terms for this type of data.

Submit
10. Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address?

Explanation

A switch decides to forward a frame destined for a known unicast MAC address by comparing the unicast destination address to the bridging, or MAC address, table. This table contains a list of MAC addresses and the corresponding interfaces that the switch has learned through previous frame transmissions. By comparing the destination address of the incoming frame to the entries in the MAC address table, the switch can determine the appropriate interface to forward the frame to, ensuring that it reaches its intended destination.

Submit
11. Which of the following comparisons does a switch make when deciding whether a new MAC address should be added to its bridging table?

Explanation

A switch compares the unicast source address to the bridging, or MAC address, table to decide whether a new MAC address should be added. The source address is the address of the device that sent the packet, and the bridging table keeps track of the MAC addresses of devices connected to the switch. By comparing the source address to the table, the switch can determine if the MAC address is already known and if it needs to add it to the table for future reference.

Submit
12. Which of the following are not typical functions of TCP?

Explanation

TCP (Transmission Control Protocol) is a reliable and connection-oriented protocol that operates at the transport layer of the TCP/IP model. It is responsible for ensuring the reliable delivery of data between two hosts. The functions of TCP include windowing, error recovery, multiplexing using port numbers, and encryption. However, routing is not a typical function of TCP. Routing is handled by the network layer protocols, such as IP (Internet Protocol), which is responsible for determining the best path for data packets to reach their destination. Encryption, on the other hand, is typically handled by higher-level protocols or applications, such as TLS (Transport Layer Security).

Submit
13. When comparing VoIP with an HTTP-based mission-critical business application, which of the following statements are accurate about the quality of service needed from the network?

Explanation

VoIP, or Voice over Internet Protocol, is a real-time communication technology that requires a stable and reliable network connection. To ensure good call quality, VoIP needs better (lower) packet loss, meaning that fewer data packets are lost during transmission. Additionally, VoIP needs better (lower) delay, as any delay in transmitting the voice data can cause noticeable disruptions or delays in the conversation. On the other hand, HTTP, which is a protocol used for web browsing and non-real-time applications, requires less bandwidth and better (lower) jitter, which refers to the variation in delay between packets.

Submit
14. Which of the following devices would be in the same broadcast domain as PC1?

Explanation

PC2, PC3, and PC4 would be in the same broadcast domain as PC1 because they are all connected by Layer 2 devices (Ethernet hub, transparent bridge, and Ethernet switch) which do not separate broadcast traffic. These devices forward broadcast packets to all connected devices in the same network. On the other hand, PC5 is separated from PC1 by a router, which operates at Layer 3 and creates different broadcast domains. Therefore, PC5 would not be in the same broadcast domain as PC1.

Submit
15. Which of the following Ethernet standards support a maximum cable length of longer than 100 meters?

Explanation

1000BASE-LX and 100BASE-FX are the Ethernet standards that support a maximum cable length longer than 100 meters. 1000BASE-LX is a Gigabit Ethernet standard that can support cable lengths of up to 10 kilometers using single-mode fiber optic cables. 100BASE-FX is a Fast Ethernet standard that can support cable lengths of up to 2 kilometers using multi-mode fiber optic cables. 100BASE-TX and 1000BASE-T both have a maximum cable length of 100 meters, so they do not support longer cable lengths.

Submit
16. PC1, with MAC address 1111.1111.1111, is connected to Switch SW1’s Fa0/1 interface. PC2, with MAC address 2222.2222.2222, is connected to SW1’s Fa0/2 interface. PC3, with MAC address 3333.3333.3333, connects to SW1’s Fa0/3 interface. The switch begins with no dynamically learned MAC addresses, followed by PC1 sending a frame with a destination address of 2222.2222.2222. If the next frame to reach the switch is a frame sent by PC3, destined for PC2’s MAC address of 2222.2222.2222, which of the following are true?

Explanation

The switch forwards the frame out interface Fa0/1 because it has learned that the MAC address 2222.2222.2222 is connected to that interface. The switch also forwards the frame out interface Fa0/2 because it has learned that the MAC address 2222.2222.2222 is connected to that interface.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 16, 2009
    Quiz Created by
    Ajeff
Cancel
  • All
    All (16)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following devices would be in the same collision domain...
Which of the following statements best describes what a switch does...
Which of the following is a device or function whose most notable...
Which of the following functions is performed by both TCP and UDP?
Which of the following statements describes part of the process of how...
Which of the following header fields identify which TCP/IP application...
In the URL https://www.fredsco.com/name.html, which part identifies...
Which of the following is a device or function whose most notable...
What do you call data that includes the Layer 4 protocol header, and...
Which of the following statements describes part of the process of how...
Which of the following comparisons does a switch make when deciding...
Which of the following are not typical functions of TCP?
When comparing VoIP with an HTTP-based mission-critical business...
Which of the following devices would be in the same broadcast domain...
Which of the following Ethernet standards support a maximum cable...
PC1, with MAC address 1111.1111.1111, is connected to Switch SW1’s...
Alert!

Advertisement