Ccna Ane Introduction To Networking (V5 + V6) Chapter Three Answers
CCNA 1 Introduction To Networking (V5 + V6) Chapter 3 Answers
Hello, seekers hither is solution manual for CCNA 1 Introduction to Networking (v5 + v6) Chapter 3 answers 2018. The answers are marked equally red. If yous uncovering a novel query or nosotros missed a query comment it below.1) Which PDU format is used when bits are received from the network medium past times the NIC of a host?
>> file
>> frame
>> packet
>> segment
2) Refer to the exhibit. HostA is attempting to contact ServerB. Which 2 statements correctly depict the addressing that HostA volition generate inwards the process? (Choose two.)
>> A package amongst the finish IP address of RouterB.
>> A frame amongst the finish MAC address of SwitchA.
>> A package amongst the finish IP address of RouterA.
>> A frame amongst the finish MAC address of RouterA.
>> A package amongst the finish IP address of ServerB.
>> A frame amongst the finish MAC address of ServerB.
3) Which PDU is processed when a host reckoner is de-encapsulating a message at the carry layer of the TCP/IP model?
>> bits
>> frame
>> packet
>> segment
4) Which feature describes the default gateway of a host computer?
>> the logical address of the router interface on the same network equally the host computer
>> the physical address of the switch interface connected to the host computer
>> the physical address of the router interface on the same network equally the host computer
>> the logical address assigned to the switch interface connected to the router
5) Which address does a NIC occupation when deciding whether to have got a frame?
>> source IP address
>> source MAC address
>> destination IP address
>> destination MAC address
>> source Ethernet address
6) What volition plough over off if the default gateway address is incorrectly configured on a host?
>> The host cannot communicate amongst other hosts inwards the local network.
>> The switch volition non forrad packets initiated past times the host.
>> The host volition have got to occupation ARP to create upward one's hear the right address of the default gateway.
>> The host cannot communicate amongst hosts inwards other networks.
>> A ping from the host to 127.0.0.1 would non move successful.
7) Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would move used?
>> only application together with Internet layers
>> only Internet together with network access layers
>> only application, Internet, together with network access layers
>> application, transport, Internet, together with network access layers
>> only application, transport, network, information link, together with physical layers
>> application, session, transport, network, information link, together with physical layers
8) At which layer of the OSI model would a logical address move encapsulated?
>> physical layer
>> data link layer
>> network layer
>> transport layer
9) Which iii layers of the OSI model are comparable inwards business office to the application layer of the TCP/IP model? (Choose three.)
>> application
>> presentation
>> session
>> transport
>> data link
>> physical
>> network
10) At which layer of the OSI model would a logical address move added during encapsulation??
>> physical layer
>> data link layer
>> network layer
>> transport layer
11) Which PDU format is used when bits are received from the network medium past times the NIC of a host?
>> file
>> frame
>> packet
>> segment
12) Which disceptation is truthful virtually the TCP/IP together with OSI models?
>> The TCP/IP carry layer together with OSI Layer four furnish like services together with functions.
>> The TCP/IP network access layer has like functions to the OSI network layer.
>> The OSI Layer vii together with the TCP/IP application layer furnish identical functions.
>> The starting fourth dimension iii OSI layers depict full general services that are also provided past times the TCP/IP cyberspace layer.
13) What is an payoff of using standards to educate together with implement protocols?
>> A item protocol tin flame exclusively move implemented past times 1 manufacturer.
>> Products from dissimilar manufacturers tin flame interoperate successfully.
>> Different manufacturers are gratis to apply dissimilar requirements when implementing a protocol.
>> Standards furnish flexibility for manufacturers to create devices that comply amongst unique requirements.
14) What are proprietary protocols?
>> protocols developed past times private organizations to operate on whatsoever vendor hardware
>> protocols that tin flame move freely used past times whatsoever organisation or vendor
>> protocols developed past times organizations who have got command over their Definition together with operation
>> a collection of protocols known equally the TCP/IP protocol suite
15) What iii application layer protocols are percentage of the TCP/IP protocol suite? (Choose three.)
>> ARP
>> DHCP
>> DNS
>> FTP
>> NAT
>> PPP
16) What is an payoff of network devices using opened upward criterion protocols?
>> Network communications is confined to information transfers betwixt devices from the same vendor.
>> A customer host together with a server running dissimilar operating systems tin flame successfully central data.
>> Internet access tin flame move controlled past times a unmarried internet service provider inwards each market.
>> Competition together with invention are express to specific types of products.
17) What method tin flame move used past times 2 computers to ensure that packets are non dropped because equally good much information is existence sent equally good quickly?
>> encapsulation
>> flow control
>> access method
>> response timeout
18) What type of communication volition send a message to all devices on a local surface area network?
>> broadcast
>> multicast
>> unicast
>> allcast
19) A spider web customer is sending a asking for a webpage to a spider web server. From the perspective of the client, what is the right guild of the protocol stack that is used to laid the asking for transmission?
>> HTTP, IP, TCP, Ethernet
>> HTTP, TCP, IP, Ethernet
>> Ethernet, TCP, IP, HTTP
>> Ethernet, IP, TCP, HTTP
20) What procedure is used to house 1 message within about other message for transfer from the source to the destination?
>> access control
>> decoding
>> encapsulation
>> flow control
21) Which disceptation is right virtually network protocols?
>> Network protocols define the type of hardware that is used together with how it is mounted inwards racks.
>> They define how messages are exchanged betwixt the source together with the destination.
>> They all business office inwards the network access layer of TCP/IP.
>> They are exclusively required for central of messages betwixt devices on remote networks.
22) Match the description to the organization. (Not all options are used.)
23) Match the protocol business office to the description piece taking into consideration that a network customer is visiting a spider web site.
24) Match each description to its corresponding term
Now From Here Onward The Solution Is For CCNAv5.
25) Which protocol is used past times a reckoner to uncovering the MAC address of the default gateway on an Ethernet network?
>> ARP
>> TCP
>> UDP
>> DHCP
26) If the default gateway is configured incorrectly on the host, what is the touching on communications?
>> The host is unable to communicate on the local network.
>> The host tin flame communicate amongst other hosts on the local network, but is unable to communicate amongst hosts on remote networks.
>> The host tin flame communicate amongst other hosts on remote networks, but is unable to communicate amongst hosts on the local network.
>> There is no touching on communications.
27) Open the PT Activity. Perform the tasks inwards the activeness instructions together with and thus reply the question. Based on the configured network, what IP address would PC1 together with PC2 occupation equally their default gateway?
>> 192.168.1.2
>> 10.1.1.1
>> 172.16.1.1
>> 192.168.1.1
>> 192.168.1.10
28) Influenza A virus subtype H5N1 user sends an HTTP asking to a spider web server on a remote network. During encapsulation for this request, what information is added to the address plain of a frame to dot the destination?
>> the MAC address of the default gateway
>> the IP address of the finish host
>> the MAC address of the finish host
>> the IP address of the default gateway
29) Refer to the exhibit. PC-A together with PC-B are both inwards VLAN 60. PC-A is unable to communicate amongst PC-B. What is the problem?
>> The native VLAN is existence pruned from the link.
>> The body has been configured amongst the switchport nonegotiate command.
>> The native VLAN should move VLAN 60.
>> The VLAN that is used past times PC-A is non inwards the listing of allowed VLANs on the trunk.*
30) Which command is used to withdraw exclusively VLAN xx from a switch?
>> no switchport access vlan 20
>> no vlan 20
>> delete vlan.dat
>> delete flash:vlan.dat
31) Influenza A virus subtype H5N1 reckoner inwards a given network is communicating amongst a specific grouping of computers. What type of communication is this?
>> broadcast
>> multicast
>> unicast
>> ARP
>> HTTP
32) Which protocol is responsible for controlling the size together with charge per unit of measurement of the HTTP messages exchanged betwixt server together with client?
>> HTTP
>> ARP
>> TCP
>> DHCP
33) Influenza A virus subtype H5N1 user is viewing an HTML document located on a spider web server. What protocol segments the messages together with manages the segments inwards the private conversation betwixt the spider web server together with the spider web client?
>> DHCP
>> TCP
>> HTTP
>> ARP
34) Which IEEE criterion enables a wireless NIC to connect to a wireless AP that is made past times a dissimilar manufacturer?
>> 802.1
>> 802.11
>> 802.3
>> 802.2
35) What is a business office of Layer four of the OSI model?
>> to specify the package type to move used past times the communications
>> to apply framing information to the packet, based on the attached media
>> to stand upward for information to the user, including encoding together with dialog control
>> to depict the ordered together with reliable delivery of information betwixt source together with destination
36) What is a produce goodness of using a layered model for network communications?
>> fostering contest amid device together with software vendors past times enforcing the compatibility of their products
>> enhancing network transmission performance past times defining targets for each layer
>> avoiding possible incompatibility issues past times using a mutual laid of developing tools
>> simplifying protocol evolution past times limiting every layer to 1 function
37) What is the full general term that is used to depict a slice of information at whatsoever layer of a networking model?
>> frame
>> packet
>> protocol information unit
>> segment
38) Which disceptation accurately describes a TCP/IP encapsulation procedure when a PC is sending information to the network?
>> Data is sent from the cyberspace layer to the network access layer.
>> Packets are sent from the network access layer to the carry layer.
>> Segments are sent from the carry layer to the cyberspace layer.
>> Frames are sent from the network access layer to the cyberspace layer.
39) What disceptation describes the business office of the Address Resolution Protocol?
>> ARP is used to uncovering the IP address of whatsoever host on a dissimilar network.
>> ARP is used to uncovering the IP address of whatsoever host on the local network.
>> ARP is used to uncovering the MAC address of whatsoever host on a dissimilar network.
>> ARP is used to uncovering the MAC address of whatsoever host on the local network.
40) Which address provides a unique host address for information communications at the cyberspace layer?
>> data-link address
>> logical address
>> Layer 2 address
>> physical address
Don't forget to Share this post amongst your friends
Now From Here Onward The Solution Is For CCNAv5.
25) Which protocol is used past times a reckoner to uncovering the MAC address of the default gateway on an Ethernet network?
>> ARP
>> TCP
>> UDP
>> DHCP
26) If the default gateway is configured incorrectly on the host, what is the touching on communications?
>> The host is unable to communicate on the local network.
>> The host tin flame communicate amongst other hosts on the local network, but is unable to communicate amongst hosts on remote networks.
>> The host tin flame communicate amongst other hosts on remote networks, but is unable to communicate amongst hosts on the local network.
>> There is no touching on communications.
27) Open the PT Activity. Perform the tasks inwards the activeness instructions together with and thus reply the question. Based on the configured network, what IP address would PC1 together with PC2 occupation equally their default gateway?
>> 192.168.1.2
>> 10.1.1.1
>> 172.16.1.1
>> 192.168.1.1
>> 192.168.1.10
28) Influenza A virus subtype H5N1 user sends an HTTP asking to a spider web server on a remote network. During encapsulation for this request, what information is added to the address plain of a frame to dot the destination?
>> the MAC address of the default gateway
>> the IP address of the finish host
>> the MAC address of the finish host
>> the IP address of the default gateway
29) Refer to the exhibit. PC-A together with PC-B are both inwards VLAN 60. PC-A is unable to communicate amongst PC-B. What is the problem?
>> The native VLAN is existence pruned from the link.
>> The body has been configured amongst the switchport nonegotiate command.
>> The native VLAN should move VLAN 60.
>> The VLAN that is used past times PC-A is non inwards the listing of allowed VLANs on the trunk.*
30) Which command is used to withdraw exclusively VLAN xx from a switch?
>> no switchport access vlan 20
>> no vlan 20
>> delete vlan.dat
>> delete flash:vlan.dat
31) Influenza A virus subtype H5N1 reckoner inwards a given network is communicating amongst a specific grouping of computers. What type of communication is this?
>> broadcast
>> multicast
>> unicast
>> ARP
>> HTTP
32) Which protocol is responsible for controlling the size together with charge per unit of measurement of the HTTP messages exchanged betwixt server together with client?
>> HTTP
>> ARP
>> TCP
>> DHCP
33) Influenza A virus subtype H5N1 user is viewing an HTML document located on a spider web server. What protocol segments the messages together with manages the segments inwards the private conversation betwixt the spider web server together with the spider web client?
>> DHCP
>> TCP
>> HTTP
>> ARP
34) Which IEEE criterion enables a wireless NIC to connect to a wireless AP that is made past times a dissimilar manufacturer?
>> 802.1
>> 802.11
>> 802.3
>> 802.2
35) What is a business office of Layer four of the OSI model?
>> to specify the package type to move used past times the communications
>> to apply framing information to the packet, based on the attached media
>> to stand upward for information to the user, including encoding together with dialog control
>> to depict the ordered together with reliable delivery of information betwixt source together with destination
36) What is a produce goodness of using a layered model for network communications?
>> fostering contest amid device together with software vendors past times enforcing the compatibility of their products
>> enhancing network transmission performance past times defining targets for each layer
>> avoiding possible incompatibility issues past times using a mutual laid of developing tools
>> simplifying protocol evolution past times limiting every layer to 1 function
37) What is the full general term that is used to depict a slice of information at whatsoever layer of a networking model?
>> frame
>> packet
>> protocol information unit
>> segment
38) Which disceptation accurately describes a TCP/IP encapsulation procedure when a PC is sending information to the network?
>> Data is sent from the cyberspace layer to the network access layer.
>> Packets are sent from the network access layer to the carry layer.
>> Segments are sent from the carry layer to the cyberspace layer.
>> Frames are sent from the network access layer to the cyberspace layer.
39) What disceptation describes the business office of the Address Resolution Protocol?
>> ARP is used to uncovering the IP address of whatsoever host on a dissimilar network.
>> ARP is used to uncovering the IP address of whatsoever host on the local network.
>> ARP is used to uncovering the MAC address of whatsoever host on a dissimilar network.
>> ARP is used to uncovering the MAC address of whatsoever host on the local network.
40) Which address provides a unique host address for information communications at the cyberspace layer?
>> data-link address
>> logical address
>> Layer 2 address
>> physical address
Don't forget to Share this post amongst your friends
0 Response to "Ccna Ane Introduction To Networking (V5 + V6) Chapter Three Answers"
Post a Comment