Preview

CCNA 1

Satisfactory Essays
Open Document
Open Document
2080 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CCNA 1
CCIT05LEC QUIZ 2 CH06070809B
Instruction: Select the best answer. Print the letter of your choice in upper case on your answer sheet.
DO NOT WRITE ANYTHING ON THIS QUESTIONNAIRE.
1. Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address? D

A. It compares the unicast source address to the bridging, or MAC address, table.
B. It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
C. It compares the destination IP address to the destination MAC address.
D. It compares the unicast destination address to the bridging, or MAC address, table.
E. It compares the frame’s incoming interface to the source MAC entry in the MAC address table.

2. Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address? C

A. It compares the unicast destination address to the bridging, or MAC address, table.
B. It compares the unicast source address to the bridging, or MAC address, table.
C. It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
D. It compares the destination IP address to the destination MAC address.
E. It compares the frame’s incoming interface to the source MAC entry in the MAC address table.

3. A switch user is currently in console line configuration mode. Which of the following would place the user in enable mode? B

I. Using the exit command once
II. Using the end command once
III. Pressing the Ctrl-Z key sequence once
IV. Using the quit command

A. I and II
B. II and III
C. III and IV
D. I and III

4. Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? B

A. enable

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 Unit 5 Questions

    • 821 Words
    • 3 Pages

    through the switches on the first floor as part of the journey. Which of the following statements…

    • 821 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NIC test: It also monitors health of the other firewall by testing NIC status whether the link is up or down (cisco 2008).…

    • 480 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    4. When setting a local Cisco switchport to initiate the negotiation of a trunk link with the remote…

    • 901 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    The Media Access Control (MAC) is one of the sublayers contained in the Data Link Layer (DLL) of the Open Systems Interconnection (OSI) model. The MAC layer provides addressing and channel access control mechanisms, and works to transmit data from one Network Interface Card (NIC) to another across a connected network.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    6. IP packet is sent to forwarding host by addressing it to the resolved MAC address.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    NT 2640 Final Study Guide

    • 3714 Words
    • 15 Pages

    5. Classless and Classful Routing (454): For a routing protocol to support VLSM, the routing protocol must advertise not only the subnet number but also the subnet mask when advertising routes. Additionally, a routing protocol must include subnet masks in its routing updates to support manual route summarization.…

    • 3714 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    router D) destination host Save Question 2 (1 point) Servers are normally given ________ IP addresses. Question 2 options: A) well-known B) static C) dynamic D)…

    • 268 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Chapter 5.2.6

    • 342 Words
    • 2 Pages

    Step 4: The message is received by each device on the LAN since it is a broadcast. Each device compare the Target Protocol Address (IPv4 Address of the machine to which the source is trying to communicate) with its own Protocol Address (IPv4 Address). Those who do not match will drop the packet without any action.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    (167) Command issued to upgrade an old version of the Cisco IOS software by downloading a new image from the TFTP server…

    • 469 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Operating System

    • 1099 Words
    • 5 Pages

    Answer: d. It redirects the output of one command to the input of another command.…

    • 1099 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    | | SIM | | | | BTS | | ,-----, | | | ,-----, | | MSCs | |…

    • 1707 Words
    • 7 Pages
    Powerful Essays

Related Topics