CCNA v7 Final Exam Questions and Answers 100% Pass
31 views 0 purchase
Course
CCNA - Cisco Certified Network Associate
Institution
CCNA - Cisco Certified Network Associate
CCNA v7 Final Exam Questions and Answers 100% Pass
What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? -neighbor solicitations -neighbor advertisements
Which range of link-local addresses can be assig...
CCNA v7 Final Exam Questions and Answers 100% Pass What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 address es to Layer 2 MAC addresses? ✔✔-neighbor solicitations -neighbor advertisements Which range of link -local addresses can be assigned to an IPv6 -enabled interface? ✔✔FE80::/10 What would be the interface ID of an IPv6 enabled interface with a MAC address o f 1C-6F-65-
C2-BD-F8 when the interface ID is generated by using the EUI -64 process? ✔✔1E6F:65FF:FEC2:BDF8 An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID spa ce? ✔✔256 Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A? ✔✔BB:BB:BB:BB:BB:BB - Explain:When a host sends information to a distant network, the Layer 2 frame header wil l contain a source and destination MAC address. The source address will be the originating host device. The destination address will be the router interface that connects to the same network. In the case of host A sending information to host B, the source address is AA:AA:AA:AA:AA:AA and the destination address is the MAC address assigned to the R2 Ethernet interface, BB:BB:BB:BB:BB:BB. When a switch configuration includes a user -defined error threshold on a per -port basis, to which switching method will t he switch revert when the error threshold is reached? ✔✔store -and-
forward Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.) ✔✔-Destination IP addresses in a packet header remain cons tant along the entire path to a target host. -Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another. What is one main characteristic of the data link layer? ✔✔It shields the upper layer pro tocol from being aware of the physical medium to be used in the communication. What are three characteristics of the CSMA/CD process? (Choose three.) ✔✔-A device listens and waits until the media is not busy before transmitting. -After detecting a collisi on, hosts can attempt to resume transmission after a random time delay has expired. -All of the devices on a segment see data that passes on the network medium. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) ✔✔-
accessing the media -data encapsulation Which two commands can be used on a Windows host to display the routing table? (Choose two.) ✔✔-netstat -r -route print Explain:On a Windows host, the route print or netstat -r commands can be used to display the host routing table. Both commands generate the same output. On a router, the show ip route command is used to display the routing table. The netstat -s command is used to di splay per -
protocol statistics. The tracert command is used to display the path that a packet travels to its destination. What are two functions that are provided by the network layer? (Choose two.) ✔✔-directing data packets to destination hosts on other n etworks -providing end devices with a unique network identifier Which two statements describe features of an IPv4 routing table on a router? (Choose two.) ✔✔-
Directly connected interfaces will have two route source codes in the routing table: C and S. -If a default static route is configured in the router, an entry will be included in the routing table with source code S. How does the service password -encryption command enhance password security on Cisco routers and switches? ✔✔-It encrypts passwords tha t are stored in router or switch configuration files. Why would a Layer 2 switch need an IP address? ✔✔to enable the switch to be managed remotely What characteristic describes identity theft? ✔✔the use of stolen credentials to access private data
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller BrilliantScores. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.