TCP/IP Quiz: ICMP and MAC Addresses
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What source MAC address is contained in the frame as it leaves R2 destined for host B?

  • abcd.abcd.b002 (correct)
  • abcd.abcd.d004
  • abcd.abcd.a001
  • abcd.abcd.c003
  • If host 1 sends a broadcast, what will happen in a default configuration of SW1 and SW2?

  • Only hosts 3 and 4 will receive the broadcast.
  • Only hosts 2, 3, and 4 will receive the broadcast.
  • Hosts 1, 2, 3, and 4 will all receive the broadcast.
  • The Fa0/0 interface of R1 will receive the broadcast. (correct)
  • What is one reason that Layer 2 encapsulation information is changed as a frame leaves a Layer 3 device?

  • The frame was encapsulated in a different Layer 3 protocol.
  • Data format changed from digital to analog.
  • The physical media type has changed.
  • The address of the destination device has changed. (correct)
  • In the communication between host 1 and host 2 over the point-to-point WAN, what does dashed line A represent?

    <p>Point-to-Point Protocol (PPP)</p> Signup and view all the answers

    Which of the following describes what happens to a broadcast sent from host 1 in the given network?

    <p>Only the hosts in the same broadcast domain will receive it.</p> Signup and view all the answers

    What happens to encapsulation as a frame enters and exits a Layer 3 device?

    <p>The frame may be encapsulated in a different Layer 2 protocol.</p> Signup and view all the answers

    When transitioning between a 10BASE-TX and a 100BASE-TX network, what is a possible change observed in encapsulation?

    <p>Change in speed of data transmission</p> Signup and view all the answers

    What encapsulation type can change when a frame traverses from a local network to a WAN?

    <p>HDLC to PPP</p> Signup and view all the answers

    Why is flash memory erased prior to upgrading the IOS image from the TFTP server?

    <p>Erasing current flash content is requested during the copy dialog</p> Signup and view all the answers

    For what reasons has the router loaded its IOS image from the specified location?

    <p>Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server</p> Signup and view all the answers

    Which two commands can determine a Cisco router chassis serial number?

    <p>show diag</p> Signup and view all the answers

    Which command helps a network administrator manage memory by displaying flash memory and NVRAM utilization?

    <p>show file systems</p> Signup and view all the answers

    Which of the following options is NOT true about the boot process of Cisco IOS?

    <p>The Cisco IOS must be corrupted to load from ROMMON mode</p> Signup and view all the answers

    What is the role of the command 'dir flash:' in the context of Cisco IOS?

    <p>It lists the files stored in the flash memory</p> Signup and view all the answers

    What will happen if a TFTP server is unreachable during an IOS image upgrade?

    <p>The IOS upgrade will proceed using the existing flash image</p> Signup and view all the answers

    What is the primary reason for using 'show version' on a Cisco router?

    <p>To verify the IOS version and device hardware information</p> Signup and view all the answers

    Which command allows you to see output from the OSPF debug command?

    <p>terminal monitor</p> Signup and view all the answers

    To manage Core2 remotely from any subnet, which commands are necessary?

    <p>Core2(config)# ip default-gateway 192.168.1.9</p> Signup and view all the answers

    What must be verified before backing up an IOS image to a TFTP server?

    <p>The server has adequate space for the IOS image.</p> Signup and view all the answers

    What is the main role of the traceroute command?

    <p>To show how many hops a packet takes to reach its destination.</p> Signup and view all the answers

    Which command would you use to set a password for vty lines on the device?

    <p>Core2(config)# line vty 0 4; Core2(config-line)# password cisco</p> Signup and view all the answers

    Which of the following commands is used to set the default gateway on a switch?

    <p>Core2(config)# ip default-gateway 192.168.1.1</p> Signup and view all the answers

    What configuration is required for proper TFTP file transfer?

    <p>Ensure the TFTP server can store binary files.</p> Signup and view all the answers

    Which command is NOT part of configuring an interface for remote management?

    <p>Core2(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1</p> Signup and view all the answers

    Which two subnet masks will support an appropriate addressing scheme for a Class B address?

    <p>255.255.252.0</p> Signup and view all the answers

    Which two host addresses are valid on the subnet 192.168.20.19/28?

    <p>192.168.20.17</p> Signup and view all the answers

    Which three IP addresses fall into the CIDR block of 115.64.4.0/22?

    <p>115.64.3.255</p> Signup and view all the answers

    Which two packet destination addresses will R2 forward to R1 given the summary of 192.1.144.0/20?

    <p>192.1.151.254</p> Signup and view all the answers

    Which two statements describe private IP addresses?

    <p>Addresses that cannot be routed through the public Internet</p> Signup and view all the answers

    Given the network 172.25.0.0 divided into eight equal subnets, which IP addresses can be assigned to hosts in the third subnet?

    <p>172.25.0.16</p> Signup and view all the answers

    Which two subnet masks will allow for the greatest number of hosts per subnet within the Class B range?

    <p>255.255.255.192</p> Signup and view all the answers

    In the context of IPv4 addressing, which three addresses are valid within the CIDR block defined as 192.1.144.0/20?

    <p>192.1.150.10</p> Signup and view all the answers

    What information can be concluded about the MAC address of host A in the given scenario?

    <p>All devices in this LAN except host A will pass the packet to Layer 3.</p> Signup and view all the answers

    Which protocol is best suited for establishing a secure terminal connection to a network device?

    <p>SSH</p> Signup and view all the answers

    What does receiving a reply when issuing the command ping 127.0.0.1 confirm?

    <p>The PC has the TCP/IP protocol stack correctly installed.</p> Signup and view all the answers

    What is the primary purpose of using the traceroute command?

    <p>To see the path a packet will take to a specified destination.</p> Signup and view all the answers

    In a network with a fully populated MAC table, what happens when host A sends a frame?

    <p>The switch sends the frame only to the relevant devices based on MAC address.</p> Signup and view all the answers

    Which network protocol operates at the application layer of the OSI model and is considered secure?

    <p>SSH</p> Signup and view all the answers

    What is the expected outcome when a PC is correctly configured and pinged to 127.0.0.1?

    <p>The PC's TCP/IP stack is operational and correctly installed.</p> Signup and view all the answers

    Which of the following commands would you use to assess the route a packet takes to a remote server?

    <p>traceroute</p> Signup and view all the answers

    Study Notes

    ICMP and Network Protocols

    • ICMP (Internet Control Message Protocol) is used for network diagnostics and troubleshooting.
    • Pinging is a common function of ICMP to test connectivity between hosts.

    Frame Addressing

    • The MAC addresses and IP addresses are encapsulated in frames as they traverse networks.
    • Host A's ping to Host B includes source MAC and IP addresses; these addresses change based on the network path.

    Broadcast Traffic

    • Broadcasts sent from Host 1 would be received by all hosts in the same network segment; specific forwarding only happens if interfaces or VLAN segmentation is configured.

    Frame Encapsulation Changes

    • The encapsulation can change due to different WAN encapsulation types and changes in source and destination MAC addresses as packets move between Layer 2 devices.

    WAN Protocols

    • Protocol A in point-to-point WAN communication typically refers to IP, which governs data routing across the Internet.

    Layer 2 and Layer 3 Interaction

    • When a frame leaves a switch, it may change the information based on MAC address tables; only destination MAC will guide the forwarding in local networks.

    Secure Remote Access

    • SSH (Secure Shell) is the preferred protocol for establishing a secure terminal connection to remote devices, as opposed to less secure methods such as Telnet.

    Loopback Address Testing

    • Pinging the loopback address (127.0.0.1) confirms that the TCP/IP stack is correctly installed on the PC.

    Traceroute Functionality

    • The traceroute command is utilized to trace the path packets take to their destination, showing each hop along the way.

    Cisco IOS Commands for Network Management

    • Commands like show inventory and show diag are used to retrieve the chassis serial number in privileged mode.
    • show file systems can be used to monitor memory usage, including flash memory and NVRAM.

    Network Addressing and Subnetting

    • Subnet masks determine the range of valid addresses within a network. Addressing schemes require careful configuration to support a specific number of hosts.
    • Valid host addresses are determined by their remaining bits after subnetting based on CIDR notation.

    Private IP Addresses

    • Private IP addresses are specified for internal networks and are not routable on the public Internet.
    • They serve to conserve public addresses and enhance security by keeping certain segments hidden from external access.

    Summary of Configuration Steps

    • When configuring devices for remote management or network operations, ensure correct IP addressing, default gateways, and proper command execution to facilitate communication and management across routes.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    CCNA_640-802_WA.pdf

    Description

    Test your knowledge on TCP/IP protocols, focusing specifically on ICMP operations and MAC address resolution. This quiz includes questions about source addresses and routing mechanisms within a network. Prepare to deepen your understanding of network communications!

    More Like This

    Router Ports: Commonly Used
    12 questions
    Sem 2 Networking 10-1 ICMP
    36 questions
    2101 Ch13:  ICMP Protocol Overview
    25 questions
    Use Quizgecko on...
    Browser
    Browser