CCNA Chapter 5 Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Joshua19942
J
Joshua19942
Community Contributor
Quizzes Created: 1 | Total Attempts: 402
Questions: 22 | Attempts: 409

SettingsSettingsSettings
CCNA Quizzes & Trivia

Questions and Answers
  • 1. 

    What happens to runt frames received by a Cisco Ethernet switch?

    • A.

      The frame is dropped.

    • B.

      The frame is returned to the originating network device.

    • C.

      The frame is broadcast to all other devices on the same network.

    • D.

      The frame is sent to the default gateway.

    Correct Answer
    A. The frame is dropped.
    Explanation
    Runt frames are Ethernet frames that are smaller than the minimum frame size allowed by the Ethernet standard. When a Cisco Ethernet switch receives a runt frame, it drops the frame. This is because runt frames are usually considered to be errors or invalid frames that cannot be processed properly. Dropping the runt frame helps to maintain the integrity and efficiency of the network by not forwarding or processing faulty or incomplete frames.

    Rate this question:

  • 2. 

    What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)
       

      • A.

        56 bytes

      • B.

        64 bytes

      • C.

        128 bytes

      • D.

        1024 bytes

      • E.

        1518 bytes

      Correct Answer(s)
      B. 64 bytes
      E. 1518 bytes
      Explanation
      The minimum size of an Ethernet frame is 64 bytes, while the maximum size is 1518 bytes. Ethernet frames are used to transmit data over Ethernet networks, and they consist of various components such as the preamble, destination and source addresses, payload, and checksum. The minimum size of 64 bytes ensures that the frame can carry the necessary control information, while the maximum size of 1518 bytes is determined by the maximum payload size allowed by the Ethernet standard, which is 1500 bytes, plus additional overhead for other components.

      Rate this question:

    • 3. 

      What statement describes Ethernet?
         

        • A.

          It defines the most common LAN type in the world.

        • B.

          It is the required Layer 1 and 2 standard for internet communication.

        • C.

          It defines a standard model used to describe how networking works.

        • D.

          It connects multiple sites such as routers located in different countries.

        Correct Answer
        A. It defines the most common LAN type in the world.
        Explanation
        Ethernet is a widely used technology that defines the most common LAN (Local Area Network) type in the world. It is a set of standards that specifies the physical and data link layer protocols for wired networks. Ethernet allows devices to communicate and share resources within a local network, such as a home or office. It is not specifically related to internet communication or connecting multiple sites, but rather focuses on local network connectivity.

        Rate this question:

      • 4. 

        Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)
           

          • A.

            Logical link control is implemented in software.

          • B.

            The LLC sublayer interacts directly with the NIC driver software.

          • C.

            The data link layer uses LLC to communicate with the upper layers of the protocol suite.

          • D.

            The LLC sublayer is responsible for the placement and retrieval of frames on and off the media.

          • E.

            Logical link control is specified in the IEEE 802.3 standard.

          Correct Answer(s)
          A. Logical link control is implemented in software.
          C. The data link layer uses LLC to communicate with the upper layers of the protocol suite.
          Explanation
          The logical link control sublayer in Ethernet standards is responsible for implementing software-based functions. It interacts directly with the NIC driver software and allows the data link layer to communicate with the upper layers of the protocol suite. The LLC sublayer is not responsible for placing and retrieving frames on and off the media. Logical link control is specified in the IEEE 802.3 standard.

          Rate this question:

        • 5. 

          What statement describes a characteristic of MAC addresses?
             

            • A.

              They must be globally unique

            • B.

              They are only routable within the private network.

            • C.

              They are added as part of a Layer 3 PDU.

            • D.

              They have a 32-bit binary value.

            Correct Answer
            A. They must be globally unique
            Explanation
            MAC addresses must be globally unique. This means that no two devices on a network should have the same MAC address. This uniqueness is important for the proper functioning of network protocols and ensuring that data is sent to the correct destination. MAC addresses are assigned by the manufacturer of the network interface card (NIC) and are typically hardcoded into the hardware.

            Rate this question:

          • 6. 

            Which statement is true about MAC addresses?
               

              • A.

                The first three bytes are used by the vendor assigned OUI.

              • B.

                MAC addresses are implemented by software.

              • C.

                The ISO is responsible for MAC addresses regulations.

              • D.

                A NIC only needs a MAC address if connected to a WAN.

              Correct Answer
              A. The first three bytes are used by the vendor assigned OUI.
              Explanation
              The first three bytes of a MAC address are used by the vendor assigned OUI (Organizationally Unique Identifier). This OUI helps identify the manufacturer or vendor of the network interface card (NIC) or device. The OUI is assigned by the Institute of Electrical and Electronics Engineers (IEEE) and is used to ensure uniqueness and standardization in MAC addresses. The remaining three bytes in the MAC address are assigned by the manufacturer and help identify the specific device within the vendor's range.

              Rate this question:

            • 7. 

              Which destination address is used in an ARP request frame?
                 

                • A.

                  0.0.0.0

                • B.

                  255.255.255.255

                • C.

                  FFFF.FFFF.FFFF

                • D.

                  127.0.0.1

                • E.

                  01-00-5E-00-AA-23

                Correct Answer
                C. FFFF.FFFF.FFFF
                Explanation
                The destination address used in an ARP request frame is FFFF.FFFF.FFFF. This address is the broadcast address, which means that the request is sent to all devices on the network. By using this address, the sender is able to reach all devices and ask for the MAC address associated with a specific IP address.

                Rate this question:

              • 8. 

                What addressing information is recorded by a switch to build its MAC address table?
                   

                  • A.

                    The destination Layer 3 address of incoming packets

                  • B.

                    The destination Layer 2 address of outgoing frames

                  • C.

                    The source Layer 3 address of outgoing packets

                  • D.

                    The source Layer 2 address of incoming frames

                  Correct Answer
                  D. The source Layer 2 address of incoming frames
                  Explanation
                  A switch builds its MAC address table by recording the source Layer 2 address of incoming frames. This allows the switch to associate a specific MAC address with a specific port on the switch. By keeping track of the source MAC addresses, the switch can make forwarding decisions based on the destination MAC address of incoming frames.

                  Rate this question:

                • 9. 

                  Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?

                  • A.

                    The switch will forward the frame to all ports.

                  • B.

                    The switch will forward the frame to all ports except port 4.

                  • C.

                    The switch will forward the frame only to port 2.

                  • D.

                    The switch will discard the frame.

                  • E.

                    The switch will forward the frame only to ports 1 and 3.

                  Correct Answer
                  B. The switch will forward the frame to all ports except port 4.
                  Explanation
                  Based on the contents of the MAC address table, the switch has learned the MAC address of PC3 on port 3. Therefore, when PC1 sends a frame addressed to PC3, the switch will forward the frame to all ports except port 4, as it knows that PC3 is connected to port 3. This ensures that the frame reaches its intended destination while minimizing unnecessary traffic on the network.

                  Rate this question:

                • 10. 

                  Which switching method uses the CRC value in a frame?
                     

                    • A.

                      Cut-through

                    • B.

                      Fast-forward

                    • C.

                      Fragment-free

                    • D.

                      Store-and-forward

                    Correct Answer
                    D. Store-and-forward
                    Explanation
                    Store-and-forward is the switching method that uses the CRC (Cyclic Redundancy Check) value in a frame. In this method, the switch receives the entire frame, checks the CRC value to ensure data integrity, and then forwards the frame to the destination. This method is reliable as it verifies the correctness of the frame before forwarding, ensuring that only error-free frames are transmitted.

                    Rate this question:

                  • 11. 

                    What is auto-MDIX?
                       

                      • A.

                        A type of Cisco switch

                      • B.

                        An Ethernet connector type

                      • C.

                        A type of port on a Cisco switch

                      • D.

                        A feature that detects Ethernet cable typ​e

                      Correct Answer
                      D. A feature that detects Ethernet cable typ​e
                      Explanation
                      Auto-MDIX is a feature that automatically detects the type of Ethernet cable being used and adjusts the connection accordingly. This feature eliminates the need for crossover cables, as it can automatically detect and configure the connection for both straight-through and crossover cables. Auto-MDIX simplifies network setup and makes it easier to connect devices without worrying about the cable type.

                      Rate this question:

                    • 12. 

                      True or False?When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway.

                      • A.

                        True

                      • B.

                        False

                      Correct Answer
                      A. True
                      Explanation
                      When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway. This is because the default gateway acts as the intermediary between the local network and the remote network. The device sends the data to the default gateway's MAC address, which then forwards the data to the appropriate destination on the remote network.

                      Rate this question:

                    • 13. 

                      The ARP table in a switch maps which two types of address together?

                      • A.

                        Layer 3 address to a Layer 2 address

                      • B.

                        Layer 3 address to a Layer 4 address

                      • C.

                        Layer 4 address to a Layer 2 address

                      • D.

                        Layer 2 address to a Layer 4 address

                      Correct Answer
                      A. Layer 3 address to a Layer 2 address
                      Explanation
                      The ARP table in a switch maps Layer 3 addresses to Layer 2 addresses. This mapping allows the switch to know the Layer 2 MAC address of a device based on its Layer 3 IP address. This information is crucial for the switch to forward network traffic efficiently within the local network. By maintaining the ARP table, the switch can quickly determine the appropriate destination MAC address for each IP address it encounters.

                      Rate this question:

                    • 14. 

                      Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?

                      • A.

                        RT1 will send an ARP reply with its Fa0/0 MAC address.

                      • B.

                        PC2 will send an ARP reply with its MAC address.

                      • C.

                        RT1 will send an ARP reply with the PC2 MAC address.​

                      • D.

                        SW1 will send an ARP reply with its Fa0/1 MAC address.

                      • E.

                        SW1 will send an ARP reply with the PC2 MAC address.​

                      Correct Answer
                      B. PC2 will send an ARP reply with its MAC address.
                      Explanation
                      When PC1 issues an ARP request, it is asking for the MAC address of PC2. PC2 will receive this request and respond with an ARP reply, providing its MAC address to PC1. This allows PC1 to correctly address the packet and send it to PC2. Therefore, the correct answer is that PC2 will send an ARP reply with its MAC address.

                      Rate this question:

                    • 15. 

                      Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?

                      • A.

                        Host A sends an ARP request to the MAC address of host D.

                      • B.

                        Host D sends an ARP request to host A.

                      • C.

                        Host A sends out the packet to the switch. The switch sends the packet only to the host D, which in turn responds.

                      • D.

                        Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

                      Correct Answer
                      D. Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.
                      Explanation
                      When host A wants to send an IP packet to host D, it sends out a broadcast of FF:FF:FF:FF:FF:FF. This broadcast is received by every other host connected to the switch, including host D. Host D then responds to the broadcast with its MAC address. This allows host A to determine the MAC address of host D and send the IP packet directly to it.

                      Rate this question:

                    • 16. 

                      Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?

                      • A.

                        Only host D

                      • B.

                        Only router R1

                      • C.

                        Only hosts A, B, and C

                      • D.

                        Only hosts A, B, C, and D

                      • E.

                        Only hosts B and C

                      • F.

                        Only hosts B, C, and router R1

                      Correct Answer
                      F. Only hosts B, C, and router R1
                      Explanation
                      Host A needs to communicate with host D, but it does not have the MAC address for its default gateway. In order to find the MAC address, host A will send an ARP (Address Resolution Protocol) request. This request will be broadcasted to all devices on the same network segment. Therefore, only hosts B and C, as well as the router R1, which are all connected to the same network segment as host A, will receive the ARP request. Host D will not receive the ARP request because it is not on the same network segment as host A.

                      Rate this question:

                    • 17. 

                      Which statement describes the treatment of ARP requests on the local link?
                         

                        • A.

                          They must be forwarded by all routers on the local network.

                        • B.

                          They are received and processed by every device on the local network.

                        • C.

                          They are dropped by all switches on the local network.

                        • D.

                          They are received and processed only by the target device.

                        Correct Answer
                        B. They are received and processed by every device on the local network.
                        Explanation
                        ARP (Address Resolution Protocol) requests are used to resolve IP addresses to MAC addresses on a local network. When a device needs to communicate with another device on the same network, it sends an ARP request to find the MAC address of the target device. The correct answer states that ARP requests are received and processed by every device on the local network. This is because ARP requests are broadcasted to all devices on the network, and each device checks if the request is for its own IP address. If it is, the device responds with its MAC address. Therefore, every device on the local network receives and processes ARP requests.

                        Rate this question:

                      • 18. 

                        What are two potential network problems that can result from ARP operation? (Choose two.)
                           

                          • A.

                            Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port.

                          • B.

                            On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.

                          • C.

                            Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.

                          • D.

                            Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing.

                          • E.

                            Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network.

                          Correct Answer(s)
                          B. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.
                          C. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.
                          Explanation
                          Multiple ARP broadcasts on large networks with low bandwidth can result in data communication delays because the network may become congested with excessive ARP traffic. Additionally, network attackers can manipulate MAC address and IP address mappings in ARP messages in order to intercept network traffic, compromising the security and integrity of the network.

                          Rate this question:

                        • 19. 

                          On a Cisco switch, ___________ memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports.​

                          Correct Answer(s)
                          port-based
                          Explanation
                          On a Cisco switch, "port-based" memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports. This means that each port on the switch has its own dedicated buffer to store incoming and outgoing frames, ensuring efficient and reliable data transmission. This type of buffering allows for better traffic management and prevents congestion on the switch.

                          Rate this question:

                        • 20. 

                          A collision fragment, also known as a ____ frame, is a frame of fewer than 64 bytes in length.​

                          Correct Answer(s)
                          RUNT
                          Explanation
                          A collision fragment, also known as a RUNT frame, is a frame of fewer than 64 bytes in length. This term is commonly used in computer networking to refer to a data packet that is too small to be processed correctly. These fragments are typically the result of collisions on the network, where two or more devices transmit data simultaneously and the packets collide, causing errors. RUNT frames are usually discarded by network devices as they do not contain enough data to be useful.

                          Rate this question:

                        • 21. 

                          ARP ____ is a technique that is used to send fake ARP messages to other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses.

                          Correct Answer(s)
                          spoofing
                          Explanation
                          ARP spoofing is a technique used to send fake Address Resolution Protocol (ARP) messages to other hosts in the local area network (LAN). The purpose of ARP spoofing is to associate IP addresses with incorrect MAC addresses. This can be done to intercept network traffic, perform man-in-the-middle attacks, or gain unauthorized access to network resources. By sending fake ARP messages, the attacker can trick other hosts into sending their data to the wrong MAC address, allowing the attacker to intercept and manipulate the network traffic.

                          Rate this question:

                        Quiz Review Timeline +

                        Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

                        • Current Version
                        • Mar 20, 2023
                          Quiz Edited by
                          ProProfs Editorial Team
                        • Sep 28, 2016
                          Quiz Created by
                          Joshua19942
                        Back to Top Back to top
                        Advertisement
                        ×

                        Wait!
                        Here's an interesting quiz for you.

                        We have other quizzes matching your interest.