CCNA 1 Introduction To Networking (V5 + V6) Chapter 3 Answers
Hello, seekers hither is solution manual for CCNA 1 Introduction to Networking (v5 + v6) Chapter 3 answers 2018. The answers are marked equally red. If yous detect a novel enquiry or nosotros missed a enquiry comment it below.1) Which PDU format is used when bits are received from the network medium past times the NIC of a host?
>> file
>> frame
>> packet
>> segment
2) Refer to the exhibit. HostA is attempting to contact ServerB. Which 2 statements correctly depict the addressing that HostA volition generate inward the process? (Choose two.)
>> A bundle with the goal IP address of RouterB.
>> A frame with the goal MAC address of SwitchA.
>> A bundle with the goal IP address of RouterA.
>> A frame with the goal MAC address of RouterA.
>> A bundle with the goal IP address of ServerB.
>> A frame with the goal MAC address of ServerB.
3) Which PDU is processed when a host reckoner is de-encapsulating a message at the carry layer of the TCP/IP model?
>> bits
>> frame
>> packet
>> segment
4) Which feature describes the default gateway of a host computer?
>> the logical address of the router interface on the same network equally the host computer
>> the physical address of the switch interface connected to the host computer
>> the physical address of the router interface on the same network equally the host computer
>> the logical address assigned to the switch interface connected to the router
5) Which address does a NIC utilization when deciding whether to have got a frame?
>> source IP address
>> source MAC address
>> destination IP address
>> destination MAC address
>> source Ethernet address
6) What volition occur if the default gateway address is incorrectly configured on a host?
>> The host cannot communicate with other hosts inward the local network.
>> The switch volition non forwards packets initiated past times the host.
>> The host volition have got to utilization ARP to create upward one's hear the right address of the default gateway.
>> The host cannot communicate with hosts inward other networks.
>> A ping from the host to 127.0.0.1 would non hold upward successful.
7) Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would hold upward used?
>> only application too Internet layers
>> only Internet too network access layers
>> only application, Internet, too network access layers
>> application, transport, Internet, too network access layers
>> only application, transport, network, information link, too physical layers
>> application, session, transport, network, information link, too physical layers
8) At which layer of the OSI model would a logical address hold upward encapsulated?
>> physical layer
>> data link layer
>> network layer
>> transport layer
9) Which 3 layers of the OSI model are comparable inward role to the application layer of the TCP/IP model? (Choose three.)
>> application
>> presentation
>> session
>> transport
>> data link
>> physical
>> network
10) At which layer of the OSI model would a logical address hold upward added during encapsulation??
>> physical layer
>> data link layer
>> network layer
>> transport layer
11) Which PDU format is used when bits are received from the network medium past times the NIC of a host?
>> file
>> frame
>> packet
>> segment
12) Which disceptation is truthful almost the TCP/IP too OSI models?
>> The TCP/IP carry layer too OSI Layer four render like services too functions.
>> The TCP/IP network access layer has like functions to the OSI network layer.
>> The OSI Layer vii too the TCP/IP application layer render identical functions.
>> The outset 3 OSI layers depict full general services that are also provided past times the TCP/IP cyberspace layer.
13) What is an payoff of using standards to educate too implement protocols?
>> A detail protocol tin entirely hold upward implemented past times 1 manufacturer.
>> Products from dissimilar manufacturers tin interoperate successfully.
>> Different manufacturers are costless to apply dissimilar requirements when implementing a protocol.
>> Standards render flexibility for manufacturers to create devices that comply with unique requirements.
14) What are proprietary protocols?
>> protocols developed past times private organizations to operate on whatever vendor hardware
>> protocols that tin hold upward freely used past times whatever arrangement or vendor
>> protocols developed past times organizations who have got command over their Definition too operation
>> a collection of protocols known equally the TCP/IP protocol suite
15) What 3 application layer protocols are component subdivision of the TCP/IP protocol suite? (Choose three.)
>> ARP
>> DHCP
>> DNS
>> FTP
>> NAT
>> PPP
16) What is an payoff of network devices using opened upward criterion protocols?
>> Network communications is confined to information transfers betwixt devices from the same vendor.
>> A customer host too a server running dissimilar operating systems tin successfully telephone substitution data.
>> Internet access tin hold upward controlled past times a unmarried internet service provider inward each market.
>> Competition too excogitation are express to specific types of products.
17) What method tin hold upward used past times 2 computers to ensure that packets are non dropped because equally good much information is beingness sent equally good quickly?
>> encapsulation
>> flow control
>> access method
>> response timeout
18) What type of communication volition send a message to all devices on a local surface area network?
>> broadcast
>> multicast
>> unicast
>> allcast
19) A spider web customer is sending a asking for a webpage to a spider web server. From the perspective of the client, what is the right gild of the protocol stack that is used to create the asking for transmission?
>> HTTP, IP, TCP, Ethernet
>> HTTP, TCP, IP, Ethernet
>> Ethernet, TCP, IP, HTTP
>> Ethernet, IP, TCP, HTTP
20) What procedure is used to house 1 message within about other message for transfer from the source to the destination?
>> access control
>> decoding
>> encapsulation
>> flow control
21) Which disceptation is right almost network protocols?
>> Network protocols define the type of hardware that is used too how it is mounted inward racks.
>> They define how messages are exchanged betwixt the source too the destination.
>> They all role inward the network access layer of TCP/IP.
>> They are entirely required for telephone substitution of messages betwixt devices on remote networks.
22) Match the description to the organization. (Not all options are used.)
23) Match the protocol role to the description piece taking into consideration that a network customer is visiting a spider web site.
24) Match each description to its corresponding term
Now From Here Onward The Solution Is For CCNAv5.
25) Which protocol is used past times a reckoner to detect the MAC address of the default gateway on an Ethernet network?
>> ARP
>> TCP
>> UDP
>> DHCP
26) If the default gateway is configured incorrectly on the host, what is the touching on on communications?
>> The host is unable to communicate on the local network.
>> The host tin communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
>> The host tin communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.
>> There is no touching on on communications.
27) Open the PT Activity. Perform the tasks inward the activeness instructions too and then reply the question. Based on the configured network, what IP address would PC1 too PC2 utilization equally their default gateway?
>> 192.168.1.2
>> 10.1.1.1
>> 172.16.1.1
>> 192.168.1.1
>> 192.168.1.10
28) Influenza A virus subtype H5N1 user sends an HTTP asking to a spider web server on a remote network. During encapsulation for this request, what information is added to the address plain of a frame to betoken the destination?
>> the MAC address of the default gateway
>> the IP address of the goal host
>> the MAC address of the goal host
>> the IP address of the default gateway
29) Refer to the exhibit. PC-A too PC-B are both inward VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?
>> The native VLAN is beingness pruned from the link.
>> The torso has been configured with the switchport nonegotiate command.
>> The native VLAN should hold upward VLAN 60.
>> The VLAN that is used past times PC-A is non inward the listing of allowed VLANs on the trunk.*
30) Which command is used to take entirely VLAN xx from a switch?
>> no switchport access vlan 20
>> no vlan 20
>> delete vlan.dat
>> delete flash:vlan.dat
31) Influenza A virus subtype H5N1 reckoner inward a given network is communicating with a specific grouping of computers. What type of communication is this?
>> broadcast
>> multicast
>> unicast
>> ARP
>> HTTP
32) Which protocol is responsible for controlling the size too charge per unit of measurement of the HTTP messages exchanged betwixt server too client?
>> HTTP
>> ARP
>> TCP
>> DHCP
33) Influenza A virus subtype H5N1 user is viewing an HTML document located on a spider web server. What protocol segments the messages too manages the segments inward the private conversation betwixt the spider web server too the spider web client?
>> DHCP
>> TCP
>> HTTP
>> ARP
34) Which IEEE criterion enables a wireless NIC to connect to a wireless AP that is made past times a dissimilar manufacturer?
>> 802.1
>> 802.11
>> 802.3
>> 802.2
35) What is a role of Layer four of the OSI model?
>> to specify the bundle type to hold upward used past times the communications
>> to apply framing information to the packet, based on the attached media
>> to stand upward for information to the user, including encoding too dialog control
>> to depict the ordered too reliable delivery of information betwixt source too destination
36) What is a create goodness of using a layered model for network communications?
>> fostering contest with device too software vendors past times enforcing the compatibility of their products
>> enhancing network transmission performance past times defining targets for each layer
>> avoiding possible incompatibility issues past times using a mutual gear upward of developing tools
>> simplifying protocol evolution past times limiting every layer to 1 function
37) What is the full general term that is used to depict a slice of information at whatever layer of a networking model?
>> frame
>> packet
>> protocol information unit
>> segment
38) Which disceptation accurately describes a TCP/IP encapsulation procedure when a PC is sending information to the network?
>> Data is sent from the cyberspace layer to the network access layer.
>> Packets are sent from the network access layer to the carry layer.
>> Segments are sent from the carry layer to the cyberspace layer.
>> Frames are sent from the network access layer to the cyberspace layer.
39) What disceptation describes the role of the Address Resolution Protocol?
>> ARP is used to discovery the IP address of whatever host on a dissimilar network.
>> ARP is used to discovery the IP address of whatever host on the local network.
>> ARP is used to discovery the MAC address of whatever host on a dissimilar network.
>> ARP is used to discovery the MAC address of whatever host on the local network.
40) Which address provides a unique host address for information communications at the cyberspace layer?
>> data-link address
>> logical address
>> Layer 2 address
>> physical address
Don't forget to Share this send service with your friends
Now From Here Onward The Solution Is For CCNAv5.
25) Which protocol is used past times a reckoner to detect the MAC address of the default gateway on an Ethernet network?
>> ARP
>> TCP
>> UDP
>> DHCP
26) If the default gateway is configured incorrectly on the host, what is the touching on on communications?
>> The host is unable to communicate on the local network.
>> The host tin communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
>> The host tin communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.
>> There is no touching on on communications.
27) Open the PT Activity. Perform the tasks inward the activeness instructions too and then reply the question. Based on the configured network, what IP address would PC1 too PC2 utilization equally their default gateway?
>> 192.168.1.2
>> 10.1.1.1
>> 172.16.1.1
>> 192.168.1.1
>> 192.168.1.10
28) Influenza A virus subtype H5N1 user sends an HTTP asking to a spider web server on a remote network. During encapsulation for this request, what information is added to the address plain of a frame to betoken the destination?
>> the MAC address of the default gateway
>> the IP address of the goal host
>> the MAC address of the goal host
>> the IP address of the default gateway
29) Refer to the exhibit. PC-A too PC-B are both inward VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?
>> The native VLAN is beingness pruned from the link.
>> The torso has been configured with the switchport nonegotiate command.
>> The native VLAN should hold upward VLAN 60.
>> The VLAN that is used past times PC-A is non inward the listing of allowed VLANs on the trunk.*
30) Which command is used to take entirely VLAN xx from a switch?
>> no switchport access vlan 20
>> no vlan 20
>> delete vlan.dat
>> delete flash:vlan.dat
31) Influenza A virus subtype H5N1 reckoner inward a given network is communicating with a specific grouping of computers. What type of communication is this?
>> broadcast
>> multicast
>> unicast
>> ARP
>> HTTP
32) Which protocol is responsible for controlling the size too charge per unit of measurement of the HTTP messages exchanged betwixt server too client?
>> HTTP
>> ARP
>> TCP
>> DHCP
33) Influenza A virus subtype H5N1 user is viewing an HTML document located on a spider web server. What protocol segments the messages too manages the segments inward the private conversation betwixt the spider web server too the spider web client?
>> DHCP
>> TCP
>> HTTP
>> ARP
34) Which IEEE criterion enables a wireless NIC to connect to a wireless AP that is made past times a dissimilar manufacturer?
>> 802.1
>> 802.11
>> 802.3
>> 802.2
35) What is a role of Layer four of the OSI model?
>> to specify the bundle type to hold upward used past times the communications
>> to apply framing information to the packet, based on the attached media
>> to stand upward for information to the user, including encoding too dialog control
>> to depict the ordered too reliable delivery of information betwixt source too destination
36) What is a create goodness of using a layered model for network communications?
>> fostering contest with device too software vendors past times enforcing the compatibility of their products
>> enhancing network transmission performance past times defining targets for each layer
>> avoiding possible incompatibility issues past times using a mutual gear upward of developing tools
>> simplifying protocol evolution past times limiting every layer to 1 function
37) What is the full general term that is used to depict a slice of information at whatever layer of a networking model?
>> frame
>> packet
>> protocol information unit
>> segment
38) Which disceptation accurately describes a TCP/IP encapsulation procedure when a PC is sending information to the network?
>> Data is sent from the cyberspace layer to the network access layer.
>> Packets are sent from the network access layer to the carry layer.
>> Segments are sent from the carry layer to the cyberspace layer.
>> Frames are sent from the network access layer to the cyberspace layer.
39) What disceptation describes the role of the Address Resolution Protocol?
>> ARP is used to discovery the IP address of whatever host on a dissimilar network.
>> ARP is used to discovery the IP address of whatever host on the local network.
>> ARP is used to discovery the MAC address of whatever host on a dissimilar network.
>> ARP is used to discovery the MAC address of whatever host on the local network.
40) Which address provides a unique host address for information communications at the cyberspace layer?
>> data-link address
>> logical address
>> Layer 2 address
>> physical address
Don't forget to Share this send service with your friends