Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

ITN Chapter 5 Exam Online

Last Updated on May 20, 2021 by Admin

ITN Chapter 5 Exam Online

ITN -- Chapter 5 Exam

Time limit: 0

Quiz-summary

0 of 22 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22

Information

ITN — Chapter 5 Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 22 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  1. Answered
  2. Review
  1. Question 1 of 22
    1. Question
    1 points
    What happens to runt frames received by a Cisco Ethernet switch?
    Correct

    Incorrect

    In an attempt to conserve bandwidth and not forward useless frames, Ethernet devices drop frames that are considered to be runt (less than 64 bytes) or jumbo (greater than 1500 bytes) frames.

    Hint
    In an attempt to conserve bandwidth and not forward useless frames, Ethernet devices drop frames that are considered to be runt (less than 64 bytes) or jumbo (greater than 1500 bytes) frames.
  2. Question 2 of 22
    2. Question
    2 points
    What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)
    Correct

    Incorrect

    The minimum Ethernet frame is 64 bytes. The maximum Ethernet frame is 1518 bytes. A network technician must know the minimum and maximum frame size in order to recognize runt and jumbo frames.

    Hint
    The minimum Ethernet frame is 64 bytes. The maximum Ethernet frame is 1518 bytes. A network technician must know the minimum and maximum frame size in order to recognize runt and jumbo frames.
  3. Question 3 of 22
    3. Question
    1 points
    What statement describes Ethernet?
    Correct

    Incorrect

    Ethernet is the most common LAN protocol in the world. It operates at Layer 1 and 2, but is not required for Internet communication. The OSI model is used to describe how networks operate. A WAN connects multiple sites located in different countries.

    Hint
    Ethernet is the most common LAN protocol in the world. It operates at Layer 1 and 2, but is not required for Internet communication. The OSI model is used to describe how networks operate. A WAN connects multiple sites located in different countries.
  4. Question 4 of 22
    4. Question
    2 points
    Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)
    Correct

    Incorrect

    Logical link control is implemented in software and enables the data link layer to communicate with the upper layers of the protocol suite. Logical link control is specified in the IEEE 802.2 standard. IEEE 802.3 is a suite of standards that define the different Ethernet types. The MAC (Media Access Control) sublayer is responsible for the placement and retrieval of frames on and off the media. The MAC sublayer is also responsible for adding a header and a trailer to the network layer protocol data unit (PDU).

    Hint
    Logical link control is implemented in software and enables the data link layer to communicate with the upper layers of the protocol suite. Logical link control is specified in the IEEE 802.2 standard. IEEE 802.3 is a suite of standards that define the different Ethernet types. The MAC (Media Access Control) sublayer is responsible for the placement and retrieval of frames on and off the media. The MAC sublayer is also responsible for adding a header and a trailer to the network layer protocol data unit (PDU).
  5. Question 5 of 22
    5. Question
    1 points
    What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?
    Correct

    Incorrect

    The minimum Ethernet frame size is 64 bytes. Frames smaller than 64 bytes are considered collision fragments or runt frames and are discarded.

    Hint
    The minimum Ethernet frame size is 64 bytes. Frames smaller than 64 bytes are considered collision fragments or runt frames and are discarded.
  6. Question 6 of 22
    6. Question
    1 points
    What statement describes a characteristic of MAC addresses?
    Correct

    Incorrect

    Any vendor selling Ethernet devices must register with the IEEE to ensure the vendor is assigned a unique 24-bit code, which becomes the first 24 bits of the MAC address. The last 24 bits of the MAC address are generated per hardware device. This helps to ensure globally unique addresses for each Ethernet device.

    Hint
    Any vendor selling Ethernet devices must register with the IEEE to ensure the vendor is assigned a unique 24-bit code, which becomes the first 24 bits of the MAC address. The last 24 bits of the MAC address are generated per hardware device. This helps to ensure globally unique addresses for each Ethernet device.
  7. Question 7 of 22
    7. Question
    1 points
    Which statement is true about MAC addresses?
    Correct

    Incorrect

    A MAC address is composed of 6 bytes. The first 3 bytes are used for vendor identification and the last 3 bytes must be assigned a unique value within the same OUI. MAC addresses are implemented in hardware. A NIC needs a MAC address to communicate over the LAN. The IEEE regulates the MAC addresses.

    Hint
    A MAC address is composed of 6 bytes. The first 3 bytes are used for vendor identification and the last 3 bytes must be assigned a unique value within the same OUI. MAC addresses are implemented in hardware. A NIC needs a MAC address to communicate over the LAN. The IEEE regulates the MAC addresses.
  8. Question 8 of 22
    8. Question
    1 points
    Which destination address is used in an ARP request frame?
    Correct

    Incorrect

    The purpose of an ARP request is to find the MAC address of the destination host on an Ethernet LAN. The ARP process sends a Layer 2 broadcast to all devices on the Ethernet LAN. The frame contains the IP address of the destination and the broadcast MAC address, FFFF.FFFF.FFFF.

    Hint
    The purpose of an ARP request is to find the MAC address of the destination host on an Ethernet LAN. The ARP process sends a Layer 2 broadcast to all devices on the Ethernet LAN. The frame contains the IP address of the destination and the broadcast MAC address, FFFF.FFFF.FFFF.
  9. Question 9 of 22
    9. Question
    1 points
    What addressing information is recorded by a switch to build its MAC address table?
    Correct

    Incorrect

    A switch builds a MAC address table by inspecting incoming Layer 2 frames and recording the source MAC address found in the frame header. The discovered and recorded MAC address is then associated with the port used to receive the frame.

    Hint
    A switch builds a MAC address table by inspecting incoming Layer 2 frames and recording the source MAC address found in the frame header. The discovered and recorded MAC address is then associated with the port used to receive the frame.
  10. Question 10 of 22
    10. Question
    1 points

    Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?

    ITN Chapter 5 Exam Answers 001
    ITN Chapter 5 Exam Answers 001

    Correct

    Incorrect

    The MAC address of PC3 is not present in the MAC table of the switch. Because the switch does not know where to send the frame that is addressed to PC3, it will forward the frame to all the switch ports, except for port 4, which is the incoming port.

    Hint
    The MAC address of PC3 is not present in the MAC table of the switch. Because the switch does not know where to send the frame that is addressed to PC3, it will forward the frame to all the switch ports, except for port 4, which is the incoming port.
  11. Question 11 of 22
    11. Question
    1 points
    Which switching method uses the CRC value in a frame?
    Correct

    Incorrect

    When the store-and-forward switching method is used, the switch receives the complete frame before forwarding it on to the destination. The cyclic redundancy check (CRC) part of the trailer is used to determine if the frame has been modified during transit.​​ In contrast, a cut-through switch forwards the frame once the destination Layer 2 address is read. Two types of cut-through switching methods are fast-forward and fragment-free.

    Hint
    When the store-and-forward switching method is used, the switch receives the complete frame before forwarding it on to the destination. The cyclic redundancy check (CRC) part of the trailer is used to determine if the frame has been modified during transit.​​ In contrast, a cut-through switch forwards the frame once the destination Layer 2 address is read. Two types of cut-through switching methods are fast-forward and fragment-free.
  12. Question 12 of 22
    12. Question
    1 points
    What is a characteristic of port-based memory buffering?
    Correct

    Incorrect

    Buffering is a technique used by Ethernet switches to store frames until they can be transmitted. With port-based buffering, frames are stored in queues that are linked to specific incoming and outgoing ports.

    Hint
    Buffering is a technique used by Ethernet switches to store frames until they can be transmitted. With port-based buffering, frames are stored in queues that are linked to specific incoming and outgoing ports.
  13. Question 13 of 22
    13. Question
    1 points
    What is auto-MDIX?
    Correct

    Incorrect

    Auto-MDIX is a feature that is enabled on the latest Cisco switches and that allows the switch to detect and use whatever type of cable is attached to a specific port.​​

    Hint
    Auto-MDIX is a feature that is enabled on the latest Cisco switches and that allows the switch to detect and use whatever type of cable is attached to a specific port.​​
  14. Question 14 of 22
    14. Question
    1 points

    True or False?
    When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway.

    Correct

    Incorrect

    A MAC address is only useful on the local Ethernet network. When data is destined for a remote network of any type, the data is sent to the default gateway device, the Layer 3 device that routes for the local network.

    Hint
    A MAC address is only useful on the local Ethernet network. When data is destined for a remote network of any type, the data is sent to the default gateway device, the Layer 3 device that routes for the local network.
  15. Question 15 of 22
    15. Question
    1 points
    The ARP table in a switch maps which two types of address together?
    Correct

    Incorrect

    The switch ARP table keeps a mapping of Layer 2 MAC addresses to Layer 3 IP addresses. These mappings can be learned by the switch dynamically through ARP or statically through manual configuration.

    Hint
    The switch ARP table keeps a mapping of Layer 2 MAC addresses to Layer 3 IP addresses. These mappings can be learned by the switch dynamically through ARP or statically through manual configuration.
  16. Question 16 of 22
    16. Question
    1 points

    Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?​

    ITN Chapter 5 Exam Answers 004
    ITN Chapter 5 Exam Answers 004

    Correct

    Incorrect

    When a network device wants to communicate with another device on the same network, it sends a broadcast ARP request. In this case, the request will contain the IP address of PC2. The destination device (PC2) sends an ARP reply with its MAC address.

    Hint
    When a network device wants to communicate with another device on the same network, it sends a broadcast ARP request. In this case, the request will contain the IP address of PC2. The destination device (PC2) sends an ARP reply with its MAC address.
  17. Question 17 of 22
    17. Question
    1 points

    Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?

    ITN Chapter 5 Exam Answers 003
    ITN Chapter 5 Exam Answers 003

    Correct

    Incorrect

    Whenever the destination MAC address is not contained within the ARP table of the originating host, the host (host A in this example) will send a Layer 2 broadcast that has a destination MAC address of FF:FF:FF:FF:FF:FF. All devices on the same network receive this broadcast. Host D will respond to this broadcast.

    Hint
    Whenever the destination MAC address is not contained within the ARP table of the originating host, the host (host A in this example) will send a Layer 2 broadcast that has a destination MAC address of FF:FF:FF:FF:FF:FF. All devices on the same network receive this broadcast. Host D will respond to this broadcast.
  18. Question 18 of 22
    18. Question
    1 points

    Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?

    ITN Chapter 5 Exam Answers 002
    ITN Chapter 5 Exam Answers 002

    Correct

    Incorrect

    Since host A does not have the MAC address of the default gateway in its ARP table, host A sends an ARP broadcast. The ARP broadcast would be sent to every device on the local network. Hosts B, C, and router R1 would receive the broadcast. Router R1 would not forward the message.

    Hint
    Since host A does not have the MAC address of the default gateway in its ARP table, host A sends an ARP broadcast. The ARP broadcast would be sent to every device on the local network. Hosts B, C, and router R1 would receive the broadcast. Router R1 would not forward the message.
  19. Question 19 of 22
    19. Question
    1 points
    Which statement describes the treatment of ARP requests on the local link?
    Correct

    Incorrect

    One of the negative issues with ARP requests is that they are sent as a broadcast. This means all devices on the local link must receive and process the request.

    Hint
    One of the negative issues with ARP requests is that they are sent as a broadcast. This means all devices on the local link must receive and process the request.
  20. Question 20 of 22
    20. Question
    2 points
    What are two potential network problems that can result from ARP operation? (Choose two.)
    Correct

    Incorrect

    Large numbers of ARP broadcast messages could cause momentary data communications delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent to intercept network traffic. ARP requests and replies cause entries to be made into the ARP table, not the MAC address table. ARP table overflows are very unlikely. Manually configuring static ARP associations is a way to prevent, not facilitate, ARP poisoning and MAC address spoofing. Multiple ARP replies resulting in the switch MAC address table containing entries that match the MAC addresses of connected nodes and are associated with the relevant switch port are required for normal switch frame forwarding operations. It is not an ARP caused network problem.

    Hint
    Large numbers of ARP broadcast messages could cause momentary data communications delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent to intercept network traffic. ARP requests and replies cause entries to be made into the ARP table, not the MAC address table. ARP table overflows are very unlikely. Manually configuring static ARP associations is a way to prevent, not facilitate, ARP poisoning and MAC address spoofing. Multiple ARP replies resulting in the switch MAC address table containing entries that match the MAC addresses of connected nodes and are associated with the relevant switch port are required for normal switch frame forwarding operations. It is not an ARP caused network problem.
  21. Question 21 of 22
    21. Question
    1 points
    What is the aim of an ARP spoofing attack?
    Correct

    Incorrect

    In an ARP spoofing attack, a malicious host intercepts ARP requests and replies to them so that network hosts will map an IP address to the MAC address of the malicious host.

    Hint
    In an ARP spoofing attack, a malicious host intercepts ARP requests and replies to them so that network hosts will map an IP address to the MAC address of the malicious host.
  22. Question 22 of 22
    22. Question
    6 points

    Match the characteristic to the forwarding method. (Not all options are used.)

    Sort elements
    • has low latency
    • may forward runt frames
    • begins forwarding when destinations address is received
    • always store the entire frame
    • checks the CRC before forwarding
    • checks the frame length before forwarding
    • does not forward broadcasts
    • cut-through
      • cut-through
        • cut-through
          • store-and-forward
            • store-and-forward
              • store-and-forward
                Correct

                Incorrect

                A store-and-forward switch always stores the entire frame before forwarding, and checks its CRC and frame length. A cut-through switch can forward frames before receiving the destination address field, thus presenting less latency than a store-and-forward switch. Because the frame can begin to be forwarded before it is completely received, the switch may transmit a corrupt or runt frame. All forwarding methods require a Layer 2 switch to forward broadcast frames.

                Hint
                A store-and-forward switch always stores the entire frame before forwarding, and checks its CRC and frame length. A cut-through switch can forward frames before receiving the destination address field, thus presenting less latency than a store-and-forward switch. Because the frame can begin to be forwarded before it is completely received, the switch may transmit a corrupt or runt frame. All forwarding methods require a Layer 2 switch to forward broadcast frames.
              • CCNA1 v7
              • CCNA2 v7
              • CCNA3 v7
              System Test Exam Answers
              Modules 1 – 3 Exam Answers
              Modules 4 – 7 Exam Answers
              Modules 8 – 10 Exam Answers
              Modules 11 – 13 Exam Answers
              Modules 14 – 15 Exam Answers
              Modules 16 – 17 Exam Answers
              Practice Final – ITN Answers
              Course Feedback
              ITN Practice PT Skills Assessment (PTSA)
              Final Exam Answers
              Modules 1 – 4 Exam Answers
              Modules 5 – 6 Exam Answers
              Modules 7 – 9 Exam Answers
              Modules 10 – 13 Exam Answers
              Modules 14 – 16 Exam Answers
              ITN Practice Skills Assessment – PT Answers
              SRWE Practice Skills Assessment – PT Part 1 Answers
              SRWE Practice Skills Assessment – PT Part 2 Answers
              SRWE Hands On Skills Exam Answers
              SRWE Practice Final Exam Answers
              SRWE Final Exam Answers 
              Modules 1 – 2 Exam Answers
              Modules 3 – 5 Exam Answers
              Modules 6 – 8 Exam Answers
              Modules 9 – 12 Exam Answers
              Modules 13 – 14 Exam Answers
              ITN Practice PT Skills Assessment (PTSA) Answers
              SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
              SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
              ENSA Practice PT Skills Assessment (PTSA) Answers
              ENSA Hands On Skills Exam Answers
              Practice Final – ENSA Answers
              ENSA Final Exam Answers
              CCNA Certification Practice Exam Answers

              Copyright © 2023 PressExam.