Concluding Updated on Apr 4, 2018 by

CCNA1 Affiliate 7 Exam Answer 2016 v5.1

  1. How many bits are in an IPv4 address?

    • 32
    • 64
    • 128
    • 256
      Explanation:

      An IPv4 address is comprised of 4 octets of binary digits, each containing 8 bits, resulting in a 32-scrap accost.

  2. Which two parts are components of an IPv4 accost? (Cull two.)

    • subnet portion
    • network portion
    • logical portion
    • host portion
    • concrete portion
    • broadcast portion
      Explanation:

      An IPv4 address is divided into two parts: a network portion – to identify the specific network on which a host resides, and a host portion – to identify specific hosts on a network. A subnet mask is used to identify the length of each portion.

  3. What does the IP accost 172.17.4.250/24 stand for?

    • network address
    • multicast address
    • host accost
    • broadcast address
      Explanation:

      The /24 shows that the network address is 172.17.four.0. The broadcast address for this network would be 172.17.4.255. Useable host addresses for this network are 172.17.4.i through 172.17.4.254.

  4. What is the purpose of the subnet mask in conjunction with an IP accost?

    • to uniquely identify a host on a network
    • to place whether the accost is public or private
    • to determine the subnet to which the host belongs
    • to mask the IP address to outsiders
      Explanation:

      With the IPv4 address, a subnet mask is besides necessary. A subnet mask is a special type of IPv4 address that coupled with the IP address determines the subnet of which the device is a member. ​

  5. What subnet mask is represented past the slash notation /xx?

    • 255.255.255.248
    • 255.255.224.0
    • 255.255.240.0
    • 255.255.255.0
    • 255.255.255.192
      Explanation:

      The slash notation /20 represents a subnet mask with xx 1s. This would translate to: 11111111.11111111.11110000.0000, which in turn would catechumen into 255.255.240.0.

  6. A message is sent to all hosts on a remote network. Which blazon of message is information technology?

    • express broadcast
    • multicast
    • directed broadcast
    • unicast
      Explanation:

      A directed broadcast is a message sent to all hosts on a specific network. Information technology is useful for sending a circulate to all hosts on a nonlocal network. A multicast message is a bulletin sent to a selected group of hosts that are role of a subscribing multicast group. A express broadcast is used for a communication that is express to the hosts on the local network. A unicast message is a message sent from i host to another.

  7. What are three characteristics of multicast transmission? (Choose three.)

    • The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255.
    • A single packet can be sent to a grouping of hosts.
    • Multicast transmission can be used past routers to commutation routing information.
    • The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.
    • Computers utilize multicast transmission to asking IPv4 addresses.
    • Multicast messages map lower layer addresses to upper layer addresses.
      Explanation:

      Broadcast letters consist of single packets that are sent to all hosts on a network segment. These types of messages are used to request IPv4 addresses, and map upper layer addresses to lower layer addresses. A multicast transmission is a single packet sent to a group of hosts and is used past routing protocols, such equally OSPF and RIPv2, to exchange routes. The accost range 224.0.0.0 to 224.0.0.255 is reserved for link-local addresses to reach multicast groups on a local network.

  8. Which three IP addresses are private ? (Cull iii.)

    • 10.1.1.1
    • 172.32.5.2
    • 192.167.10.ten
    • 172.16.iv.four
    • 192.168.5.5
    • 224.6.6.vi
      Explanation:

      The private IP addresses are within these three ranges:
      x.0.0.0 – 10.255.255.255
      172.xvi.0.0 – 172.31.255.255
      192.168.0.0 – 192.168.255.255

  9. Which two IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains? (Cull two.)

    • trunking
    • dual stack
    • encapsulation
    • tunneling
    • multiplexing
      Explanation:

      There are three techniques to allow IPv4 and IPv6 to co-exist on a network. Dual stack allows IPv4 and IPv6 to coexist on the same network segment. Dual stack devices run both IPv4 and IPv6 protocol stacks simultaneously. Tunneling is a method of transporting an IPv6 package over an IPv4 network. The IPv6 packet is encapsulated inside an IPv4 package, similar to other types of information. Network Address Translation 64 (NAT64) allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4.

  10. Which of these addresses is the shortest abbreviation for the IP accost:

    3FFE : 1044 : 0000 : 0000 : 00AB : 0000 : 0000 : 0057?

    • 3FFE : 1044 :: AB :: 57
    • 3FFE : 1044 :: 00AB :: 0057
    • 3FFE : 1044 : 0 : 0 : AB :: 57
    • 3FFE : 1044 : 0 : 0 : 00AB :: 0057
    • 3FFE : 1044 : 0000 : 0000 : 00AB :: 57
    • 3FFE : 1044 : 0000 : 0000 : 00AB :: 0057
  11. What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?

    • global unicast
    • link-local
    • loopback
    • unique local
      Explanation:

      When IPv6 is enabled on whatsoever interface, that interface will automatically generate an IPv6 link-local address.

  12. What are 2 types of IPv6 unicast addresses? (Choose ii.)

    • multicast
    • loopback
    • link-local
    • anycast
    • broadcast
      Caption:

      Multicast, anycast, and unicast are types of IPv6 addresses. In that location is no broadcast address in IPv6. Loopback and link-local are specific types of unicast addresses.

  13. What are three parts of an IPv6 global unicast address? (Choose iii.)

    • an interface ID that is used to identify the local network for a particular host
    • a global routing prefix that is used to place the network portion of the address that has been provided past an ISP
    • a subnet ID that is used to identify networks inside of the local enterprise site
    • a global routing prefix that is used to identify the portion of the network address provided by a local administrator
    • an interface ID that is used to identify the local host on the network
      Explanation:

      There are three elements that make upwards an IPv6 global unicast address. A global routing prefix which is provided by an Internet service provider, a subnet ID which is determined by the organization, and an interface ID which uniquely identifies the interface interface of a host.

  14. An ambassador wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertizing letters, but likewise to obtain the DNS server address from a DHCPv6 server. Which accost assignment method should exist configured?

    • SLAAC
    • stateless DHCPv6
    • stateful DHCPv6
    • RA and EUI-64
      Explanation:

      Stateless DHCPv6 allows clients to use ICMPv6 Router Advertisement (RA) letters to automatically assign IPv6 addresses to themselves, only and so allows these clients to contact a DHCPv6 server to obtain additional information such as the domain proper noun and address of DNS servers. SLAAC does not allow the customer to obtain boosted information through DHCPv6, and stateful DHCPv6 requires that the customer receive its interface address directly from a DHCPv6 server. RA messages, when combined with an EUI-64 interface identifier, are used to automatically create an interface IPv6 address, and are function of both SLAAC and stateless DHCPv6.

  15. Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?

    • ARPv6
    • DHCPv6
    • ICMPv6
    • UDP
      Explanation:

      SLAAC uses ICMPv6 messages when dynamically assigning an IPv6 accost to a host. DHCPv6 is an alternate method of assigning an IPv6 addresses to a host. ARPv6 does not exist. Neighbor Discovery Protocol (NDP) provides the functionality of ARP for IPv6 networks. UDP is the transport layer protocol used by DHCPv6.

  16. Which two things tin can be determined by using the ping command? (Choose two.)

    • the number of routers between the source and destination device
    • the IP address of the router nearest the destination device
    • the average fourth dimension it takes a packet to attain the destination and for the response to render to the source
    • the destination device is reachable through the network
    • the average time information technology takes each router in the path between source and destination to respond
      Explanation:

      A ping command provides feedback on the fourth dimension between when an echo request was sent to a remote host and when the echo reply was received. This can exist a mensurate of network performance. A successfulpinglikewise indicates that the destination host was reachable through the network.

  17. What is the purpose of ICMP messages?

    • to inform routers about network topology changes
    • to ensure the delivery of an IP packet
    • to provide feedback of IP packet transmissions
    • to monitor the process of a domain proper noun to IP address resolution
      Caption:

      The purpose of ICMP messages is to provide feedback about bug that are related to the processing of IP packets.

  18. What is indicated by a successful ping to the ::1 IPv6 accost?

    • The host is cabled properly.
    • The default gateway address is correctly configured.
    • All hosts on the local link are available.
    • The link-local address is correctly configured.
    • IP is properly installed on the host.
      Caption:

      The IPv6 address ::i is the loopback address. A successful ping to this address means that the TCP/IP stack is correctly installed. It does not mean that any addresses are correctly configured.

  19. A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the package?

    • when the router receives an ICMP Time Exceeded message
    • when the RTT value reaches zero
    • when the host responds with an ICMP Echo Answer message
    • when the value in the TTL field reaches null
    • when the values of both the Echo Request and Repeat Respond messages reach zero
      Explanation:

      When a router receives a traceroute parcel, the value in the TTL field is decremented by ane. When the value in the field reaches zero, the receiving router will not forward the packet, and will send an ICMP Time Exceeded message dorsum to the source.

  20. What field content is used by ICMPv6 to determine that a packet has expired?

    • TTL field
    • CRC field
    • Hop Limit field
    • Time Exceeded field
      Explanation:

      ICMPv6 sends a Fourth dimension Exceeded bulletin if the router cannot forward an IPv6 packet considering the package expired. The router uses a hop limit field to determine if the package has expired, and does not have a TTL field.

  21. Fill in the blank.

    The decimal equivalent of the binary number 10010101 is149 .

  22. Fill in the blank.
    The binary equivalent of the decimal number 232 is 11101000

  23. Fill in the bare.
    What is the decimal equivalent of the hex number 0x3F?63

    Explanation:
    1. Hex 0x3F is 63 in decimal.
      (3*xvi)+(xv*1) = 63
  24. Lucifer each description with an appropriate IP address. (Non all options are used.)

    • Question

      CCNA1 Chapter 7 v5.1 001 Question

      CCNA1 Affiliate 7 v5.1 001 Question

    • Respond

      CCNA1 Chapter 7 v5.1 001 Answer

      CCNA1 Chapter 7 v5.1 001 Answer

      Explanation:

      Link-Local addresses are assigned automatically by the OS environment and are located in the block 169.254.0.0/16. The private addresses ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/sixteen. Exam-Internet addresses belong to the range 192.0.two.0/24. The addresses in the cake 240.0.0.0 to 255.255.255.254 are reserved as experimental addresses. Loopback addresses vest to the block 127.0.0.0/8.