Wednesday, March 14, 2018

Ccna I Introduction To Networking (V5 + V6) Chapter Iii Answers

CCNA 1 Introduction To Networking (V5 + V6) Chapter 3 Answers

Hello, seekers hither is solution manual for CCNA 1 Introduction to Networking (v5 + v6) Chapter 3 answers 2018. The answers are marked equally red. If yous detect a novel enquiry or nosotros missed a enquiry comment it below.

1) Which PDU format is used when bits are received from the network medium past times the NIC of a host?
>> file
>> frame
>> packet
>> segment

2) Refer to the exhibit. HostA is attempting to contact ServerB. Which 2 statements correctly depict the addressing that HostA volition generate inward the process? (Choose two.)
 seekers hither is solution manual for CCNA  CCNA 1 Introduction To Networking (V5 + V6) Chapter 3 Answers

>> A bundle with the goal IP address of RouterB.
>> A frame with the goal MAC address of SwitchA.
>> A bundle with the goal IP address of RouterA.
>> A frame with the goal MAC address of RouterA.
>> A bundle with the goal IP address of ServerB.
>> A frame with the goal MAC address of ServerB.

3) Which PDU is processed when a host reckoner is de-encapsulating a message at the carry layer of the TCP/IP model?
>> bits
>> frame
>> packet
>> segment

4) Which feature describes the default gateway of a host computer?
>> the logical address of the router interface on the same network equally the host computer
>> the physical address of the switch interface connected to the host computer
>> the physical address of the router interface on the same network equally the host computer
>> the logical address assigned to the switch interface connected to the router

5) Which address does a NIC utilization when deciding whether to have got a frame?
>> source IP address
>> source MAC address
>> destination IP address
>> destination MAC address
>> source Ethernet address

6) What volition occur if the default gateway address is incorrectly configured on a host?
>> The host cannot communicate with other hosts inward the local network.
>> The switch volition non forwards packets initiated past times the host.
>> The host volition have got to utilization ARP to create upward one's hear the right address of the default gateway.
>> The host cannot communicate with hosts inward other networks.
>> A ping from the host to 127.0.0.1 would non hold upward successful.

7) Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would hold upward used?
 seekers hither is solution manual for CCNA  CCNA 1 Introduction To Networking (V5 + V6) Chapter 3 Answers

>> only application too Internet layers
>> only Internet too network access layers
>> only application, Internet, too network access layers
>> application, transport, Internet, too network access layers
>> only application, transport, network, information link, too physical layers
>> application, session, transport, network, information link, too physical layers

8) At which layer of the OSI model would a logical address hold upward encapsulated?
>> physical layer
>> data link layer
>> network layer
>> transport layer

9) Which 3 layers of the OSI model are comparable inward role to the application layer of the TCP/IP model? (Choose three.)
>> application 
>> presentation 
>> session
>> transport
>> data link
>> physical
>> network

10At which layer of the OSI model would a logical address hold upward added during encapsulation??
>> physical layer
>> data link layer
>> network layer
>> transport layer

11Which PDU format is used when bits are received from the network medium past times the NIC of a host?
>> file
>> frame
>> packet
>> segment

12Which disceptation is truthful almost the TCP/IP too OSI models?
>> The TCP/IP carry layer too OSI Layer four render like services too functions.
>> The TCP/IP network access layer has like functions to the OSI network layer.
>> The OSI Layer vii too the TCP/IP application layer render identical functions.
>> The outset 3 OSI layers depict full general services that are also provided past times the TCP/IP cyberspace layer.

13What is an payoff of using standards to educate too implement protocols?
>> A detail protocol tin entirely hold upward implemented past times 1 manufacturer.
>> Products from dissimilar manufacturers tin interoperate successfully.
>> Different manufacturers are costless to apply dissimilar requirements when implementing a protocol.
>> Standards render flexibility for manufacturers to create devices that comply with unique requirements.

14What are proprietary protocols?
>> protocols developed past times private organizations to operate on whatever vendor hardware
>> protocols that tin hold upward freely used past times whatever arrangement or vendor
>> protocols developed past times organizations who have got command over their Definition too operation
>> a collection of protocols known equally the TCP/IP protocol suite

15What 3 application layer protocols are component subdivision of the TCP/IP protocol suite? (Choose three.)
>> ARP
>> DHCP
>> DNS
>> FTP
>> NAT
>> PPP

16What is an payoff of network devices using opened upward criterion protocols?
>> Network communications is confined to information transfers betwixt devices from the same vendor.
>> A customer host too a server running dissimilar operating systems tin successfully telephone substitution data.
>> Internet access tin hold upward controlled past times a unmarried internet service provider inward each market.
>> Competition too excogitation are express to specific types of products.

17What method tin hold upward used past times 2 computers to ensure that packets are non dropped because equally good much information is beingness sent equally good quickly?
>> encapsulation
>> flow control
>> access method
>> response timeout

18What type of communication volition send a message to all devices on a local surface area network?
>> broadcast
>> multicast
>> unicast
>> allcast

19A spider web customer is sending a asking for a webpage to a spider web server. From the perspective of the client, what is the right gild of the protocol stack that is used to create the asking for transmission?
>> HTTP, IP, TCP, Ethernet
>> HTTP, TCP, IP, Ethernet
>> Ethernet, TCP, IP, HTTP
>> Ethernet, IP, TCP, HTTP

20What procedure is used to house 1 message within about other message for transfer from the source to the destination?
>> access control
>> decoding
>> encapsulation
>> flow control

21Which disceptation is right almost network protocols?
>> Network protocols define the type of hardware that is used too how it is mounted inward racks.
>> They define how messages are exchanged betwixt the source too the destination.
>> They all role inward the network access layer of TCP/IP.
>> They are entirely required for telephone substitution of messages betwixt devices on remote networks.

22) Match the description to the organization. (Not all options are used.)


 seekers hither is solution manual for CCNA  CCNA 1 Introduction To Networking (V5 + V6) Chapter 3 Answers

23) Match the protocol role to the description piece taking into consideration that a network customer is visiting a spider web site.

 seekers hither is solution manual for CCNA  CCNA 1 Introduction To Networking (V5 + V6) Chapter 3 Answers

24) Match each description to its corresponding term


 seekers hither is solution manual for CCNA  CCNA 1 Introduction To Networking (V5 + V6) Chapter 3 Answers

Now From Here Onward The Solution Is For CCNAv5.

25) Which protocol is used past times a reckoner to detect the MAC address of the default gateway on an Ethernet network?
>> ARP
>> TCP
>> UDP
>> DHCP

26) If the default gateway is configured incorrectly on the host, what is the touching on on communications?
>> The host is unable to communicate on the local network.
>> The host tin communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
>> The host tin communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.
>> There is no touching on on communications.

27) Open the PT Activity. Perform the tasks inward the activeness instructions too and then reply the question. Based on the configured network, what IP address would PC1 too PC2 utilization equally their default gateway?
>> 192.168.1.2
>> 10.1.1.1
>> 172.16.1.1
>> 192.168.1.1
>> 192.168.1.10

28) Influenza A virus subtype H5N1 user sends an HTTP asking to a spider web server on a remote network. During encapsulation for this request, what information is added to the address plain of a frame to betoken the destination?
>> the MAC address of the default gateway
>> the IP address of the goal host
>> the MAC address of the goal host
>> the IP address of the default gateway

29) Refer to the exhibit. PC-A too PC-B are both inward VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?
 seekers hither is solution manual for CCNA  CCNA 1 Introduction To Networking (V5 + V6) Chapter 3 Answers

>> The native VLAN is beingness pruned from the link.
>> The torso has been configured with the switchport nonegotiate command.
>> The native VLAN should hold upward VLAN 60.
>> The VLAN that is used past times PC-A is non inward the listing of allowed VLANs on the trunk.*

30) Which command is used to take entirely VLAN xx from a switch?
>> no switchport access vlan 20
>> no vlan 20
>> delete vlan.dat
>> delete flash:vlan.dat

31) Influenza A virus subtype H5N1 reckoner inward a given network is communicating with a specific grouping of computers. What type of communication is this?
>> broadcast
>> multicast
>> unicast
>> ARP
>> HTTP

32) Which protocol is responsible for controlling the size too charge per unit of measurement of the HTTP messages exchanged betwixt server too client?
>> HTTP
>> ARP
>> TCP
>> DHCP

33) Influenza A virus subtype H5N1 user is viewing an HTML document located on a spider web server. What protocol segments the messages too manages the segments inward the private conversation betwixt the spider web server too the spider web client?
>> DHCP
>> TCP
>> HTTP
>> ARP

34) Which IEEE criterion enables a wireless NIC to connect to a wireless AP that is made past times a dissimilar manufacturer?
>> 802.1
>> 802.11
>> 802.3
>> 802.2

35) What is a role of Layer four of the OSI model?
>> to specify the bundle type to hold upward used past times the communications
>> to apply framing information to the packet, based on the attached media
>> to stand upward for information to the user, including encoding too dialog control
>> to depict the ordered too reliable delivery of information betwixt source too destination

36) What is a create goodness of using a layered model for network communications?
>> fostering contest with device too software vendors past times enforcing the compatibility of their products
>> enhancing network transmission performance past times defining targets for each layer
>> avoiding possible incompatibility issues past times using a mutual gear upward of developing tools
>> simplifying protocol evolution past times limiting every layer to 1 function

37) What is the full general term that is used to depict a slice of information at whatever layer of a networking model?
>> frame
>> packet
>> protocol information unit
>> segment

38) Which disceptation accurately describes a TCP/IP encapsulation procedure when a PC is sending information to the network?
>> Data is sent from the cyberspace layer to the network access layer.
>> Packets are sent from the network access layer to the carry layer.
>> Segments are sent from the carry layer to the cyberspace layer.
>> Frames are sent from the network access layer to the cyberspace layer.

39) What disceptation describes the role of the Address Resolution Protocol?
>> ARP is used to discovery the IP address of whatever host on a dissimilar network.
>> ARP is used to discovery the IP address of whatever host on the local network.
>> ARP is used to discovery the MAC address of whatever host on a dissimilar network.
>> ARP is used to discovery the MAC address of whatever host on the local network.

40) Which address provides a unique host address for information communications at the cyberspace layer?
>> data-link address
>> logical address
>> Layer 2 address
>> physical address

Don't forget to Share this send service with your friends