Cisco CCNA 1 Simulation v6.0 Test Chapter 7
- Questions and answers
Cisco CCNA 1 Simulation v6.0 Test Chapter 7 Questions and Answers
CCNA 1 Chapter 7 Quiz Questions and Answers. In this simulation, take your test, get your score and share with others!
- Points: 100
- Questions: 24
- Time limit: None
- Allowed attempts: Unlimited
Exam Chapter 7 Questions and Answers CCNA 1 V6.0
What are two types of IPv6 unicast addresses? (Choose two.)
Multicast, anycast, and unicast are types of IPv6 addresses. There is no broadcast address in IPv6. Loopback and link-local are specific types of unicast addresses.
Which of these addresses is the shortest abbreviation for the IP address:
Which three IP addresses are private ? (Choose three.)
The private IP addresses are within these three ranges:
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
What is indicated by a successful ping to the ::1 IPv6 address?
The IPv6 address ::1 is the loopback address. A successful ping to this address means that the TCP/IP stack is correctly installed. It does not mean that any addresses are correctly configured.
A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?
When a router receives a traceroute packet, the value in the TTL field is decremented by 1. When the value in the field reaches zero, the receiving router will not forward the packet, and will send an ICMP Time Exceeded message back to the source.
A message is sent to all hosts on a remote network. Which type of message is it?
A directed broadcast is a message sent to all hosts on a specific network. It is useful for sending a broadcast to all hosts on a nonlocal network. A multicast message is a message sent to a selected group of hosts that are part of a subscribing multicast group. A limited broadcast is used for a communication that is limited to the hosts on the local network. A unicast message is a message sent from one host to another.
Match each description with an appropriate IP address. (Not all options are used.)
What are three characteristics of multicast transmission? (Choose three.)
Broadcast messages consist of single packets that are sent to all hosts on a network segment. These types of messages are used to request IPv4 addresses, and map upper layer addresses to lower layer addresses. A multicast transmission is a single packet sent to a group of hosts and is used by routing protocols, such as OSPF and RIPv2, to exchange routes. The address range 22.214.171.124 to 126.96.36.199 is reserved for link-local addresses to reach multicast groups on a local network.
Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?
SLAAC uses ICMPv6 messages when dynamically assigning an IPv6 address to a host. DHCPv6 is an alternate method of assigning an IPv6 addresses to a host. ARPv6 does not exist. Neighbor Discovery Protocol (NDP) provides the functionality of ARP for IPv6 networks. UDP is the transport layer protocol used by DHCPv6.
What subnet mask is represented by the slash notation /20?
The slash notation /20 represents a subnet mask with 20 1s. This would translate to: 11111111.11111111.11110000.0000, which in turn would convert into 255.255.240.0.
Which two parts are components of an IPv4 address? (Choose two.)
An IPv4 address is divided into two parts: a network portion – to identify the specific network on which a host resides, and a host portion – to identify specific hosts on a network. A subnet mask is used to identify the length of each portion.
Which two things can be determined by using the ping command? (Choose two.)
A ping command provides feedback on the time between when an echo request was sent to a remote host and when the echo reply was received. This can be a measure of network performance. A successful ping also indicates that the destination host was reachable through the network.
What field content is used by ICMPv6 to determine that a packet has expired?
ICMPv6 sends a Time Exceeded message if the router cannot forward an IPv6 packet because the packet expired. The router uses a hop limit field to determine if the packet has expired, and does not have a TTL field.
Fill in the blank.
What is the decimal equivalent of the hex number 0x3F? __
To convert from hexadecimal to decimal, multiply each digit by the place value that is associated with the position of the digit and add the results.
What is the purpose of the subnet mask in conjunction with an IP address?
With the IPv4 address, a subnet mask is also necessary. A subnet mask is a special type of IPv4 address that coupled with the IP address determines the subnet of which the device is a member.
What is the purpose of ICMP messages?
The purpose of ICMP messages is to provide feedback about issues that are related to the processing of IP packets.
An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?
Stateless DHCPv6 allows clients to use ICMPv6 Router Advertisement (RA) messages to automatically assign IPv6 addresses to themselves, but then allows these clients to contact a DHCPv6 server to obtain additional information such as the domain name and address of DNS servers. SLAAC does not allow the client to obtain additional information through DHCPv6, and stateful DHCPv6 requires that the client receive its interface address directly from a DHCPv6 server. RA messages, when combined with an EUI-64 interface identifier, are used to automatically create an interface IPv6 address, and are part of both SLAAC and stateless DHCPv6.
What are three parts of an IPv6 global unicast address? (Choose three.)
There are three elements that make up an IPv6 global unicast address. A global routing prefix which is provided by an ISP, a subnet ID which is determined by the organization, and an interface ID which uniquely identifies the interface interface of a host.
Fill in the blank.
The decimal equivalent of the binary number 10010101 is __
To convert a binary number to the decimal equivalent, add the value of the position where any binary 1 is present.
What does the IP address 172.17.4.250/24 represent?
The /24 shows that the network address is 172.17.4.0. The broadcast address for this network would be 172.17.4.255. Useable host addresses for this network are 172.17.4.1 through 172.17.4.254.
How many bits are in an IPv4 address?
An IPv4 address is comprised of 4 octets of binary digits, each containing 8 bits, resulting in a 32-bit address.
What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?
When IPv6 is enabled on any interface, that interface will automatically generate an IPv6 link-local address.
Which two IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains? (Choose two.)
There are three techniques to allow IPv4 and IPv6 to co-exist on a network. Dual stack allows IPv4 and IPv6 to coexist on the same network segment. Dual stack devices run both IPv4 and IPv6 protocol stacks simultaneously. Tunneling is a method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is encapsulated inside an IPv4 packet, similar to other types of data. Network Address Translation 64 (NAT64) allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4
Fill in the blank.
The binary equivalent of the decimal number 232 is __
To convert a decimal number to binary, first determine if the decimal number is equal to or greater than 128. In this case, because 232 is larger than 128, a 1 is placed in the bit position for decimal value 128 and the value of 128 is then subtracted from 232. This results in the value of 104. We then compare this value to 64. As 104 is larger than 64, a 1 is placed in the bit position for the decimal value 64 and the value of 64 is subtracted from 104. The remaining value is then 40. The process should be continued for all the remaining bit positions.