CCENT/CCNA Icnd1 Chapters Quiz 6 + 7

16 Questions

Settings
CCENT Quizzes & Trivia

This is the fourth in a series of tests designed to help you perfect your understanding on the chapters you cover for CCENT/CCNA Icnd 1 classes. The one below covers chapter 6 and 7. Give it a try and keep an eye out for the next test on the following chapters.


Questions and Answers
  • 1. 
    Which of the following header fields identify which TCP/IP application gets data received by the computer?
    • A. 

      Ethernet Type

    • B. 

      SNAP Protocol Type

    • C. 

      IP Protocol Field

    • D. 

      TCP Port Number

    • E. 

      UDP Port Number

  • 2. 
    Which of the following are not typical functions of TCP?
    • A. 

      Windowing

    • B. 

      Error recovery

    • C. 

      Routing

    • D. 

      Multiplexing using port numbers

    • E. 

      Encryption

  • 3. 
    Which of the following functions is performed by both TCP and UDP?
    • A. 

      Windowing

    • B. 

      Error recovery

    • C. 

      Multiplexing using port numbers

    • D. 

      Routing

    • E. 

      Encryption

  • 4. 
    What do you call data that includes the Layer 4 protocol header, and data given to Layer 4 by the upper layers, not including any headers and trailers from Layers 1 to 3?
    • A. 

      L4PDU

    • B. 

      L3PDU

    • C. 

      Segment

    • D. 

      Packet

    • E. 

      Frame

  • 5. 
    In the URL http://www.fredsco.com/name.html, which part identifies the web server?
    • A. 

      Http

    • B. 

      Www.fredsco.com

    • C. 

      Fredsco.com

    • D. 

      Http://www.fredsco.com

    • E. 

      The file name.html includes the hostname.

  • 6. 
    • A. 

      VoIP needs better (lower) packet loss.

    • B. 

      HTTP needs less bandwidth.

    • C. 

      HTTP needs better (lower) jitter.

    • D. 

      VoIP needs better (lower) delay.

  • 7. 
    Which of the following is a device or function whose most notable feature is to examine trends over time to recognize different known attacks as compared to a list of common attack signatures?
    • A. 

      VPN

    • B. 

      Firewall

    • C. 

      IDS

    • D. 

      NAC

  • 8. 
    Which of the following is a device or function whose most notable feature is to encrypt packets before they pass through the Internet?
    • A. 

      VPN

    • B. 

      Firewall

    • C. 

      IDS

    • D. 

      NAC

  • 9. 
    Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address?
    • A. 

      It compares the unicast destination address to the bridging, or MAC address, table.

    • B. 

      It compares the unicast source address to the bridging, or MAC address, table.

    • C. 

      It forwards the frame out all interfaces in the same VLAN except for the incoming interface.

    • D. 

      It compares the destination IP address to the destination MAC address.

    • E. 

      It compares the frame’s incoming interface to the source MAC entry in the MAC address table.

  • 10. 
    Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address?
    • A. 

      It compares the unicast destination address to the bridging, or MAC address, table.

    • B. 

      It compares the unicast source address to the bridging, or MAC address, table.

    • C. 

      It forwards the frame out all interfaces in the same VLAN except for the incoming interface.

    • D. 

      It compares the destination IP address to the destination MAC address.

    • E. 

      It compares the frame’s incoming interface to the source MAC entry in the MAC address table.

  • 11. 
    Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address?
    • A. 

      It forwards out all interfaces in the same VLAN except for the incoming interface.

    • B. 

      It forwards the frame out the one interface identified by the matching entry in the MAC address table.

    • C. 

      It compares the destination IP address to the destination MAC address.

    • D. 

      It compares the frame’s incoming interface to the source MAC entry in the MAC address table.

  • 12. 
    • A. 

      It compares the unicast destination address to the bridging, or MAC address, table.

    • B. 

      It compares the unicast source address to the bridging, or MAC address, table.

    • C. 

      It compares the VLAN ID to the bridging, or MAC address, table.

    • D. 

      It compares the destination IP address’s ARP cache entry to the bridging, or MAC address, table.

  • 13. 
    • A. 

      The switch forwards the frame out interface Fa0/1.

    • B. 

      The switch forwards the frame out interface Fa0/2.

    • C. 

      The switch forwards the frame out interface Fa0/3.

    • D. 

      The switch discards (filters) the frame.

  • 14. 
    • A. 

      PC2, which is separated from PC1 by an Ethernet hub

    • B. 

      PC3, which is separated from PC1 by a transparent bridge

    • C. 

      PC4, which is separated from PC1 by an Ethernet switch

    • D. 

      PC5, which is separated from PC1 by a router

  • 15. 
    • A. 

      PC2, which is separated from PC1 by an Ethernet hub

    • B. 

      PC3, which is separated from PC1 by a transparent bridge

    • C. 

      PC4, which is separated from PC1 by an Ethernet switch

    • D. 

      PC5, which is separated from PC1 by a router

  • 16. 
    Which of the following Ethernet standards support a maximum cable length of longer than 100 meters?
    • A. 

      100BASE-TX

    • B. 

      1000BASE-LX

    • C. 

      1000BASE-T

    • D. 

      100BASE-FX