Certified Network Associate CCNA
Answers, Braindumps (200-120)
www.examcheats.net. But there’s no need to have
it from both of them, only questions from only one are
sufficient I think.
Which three features
are added in SNMPv3 over SNMPv2?
QUESTION NO: 2
In a GLBP network,
who is responsible for the arp request?
QUESTION NO: 3
Which layer in the
OSI reference model is responsible for determining the
availability of the receiving program and checking to
see if enough resources exist for that communication?
question is to examine the OSI reference model.
Application layer is responsible for identifying and
establishing the availability of the intended communication
partner and determining whether sufficient resources
for the intended communication exist.
QUESTION NO: 4
Which of the following
describes the roles of devices in a WAN? (Choose three.)
A. A CSU/DSU
terminates a digital local loop.
B. A modem
terminates a digital local loop.
C. A CSU/DSU
terminates an analog local loop.
D. A modem
terminates an analog local loop.
E. A router
is commonly considered a DTE device.
F. A router
is commonly considered a DCE device.
QUESTION NO: 5
What is the alert
message generated by SNMP agents called ?
QUESTION NO: 6
A network administrator
is verifying the configuration of a newly installed
host by establishing an FTP connection to a remote server.
What is the highest layer of the protocol stack that
the network administrator is using for this operation?
F. data link
belongs to Application layer and it is also the highest
layer of the OSI model.
QUESTION NO: 7
What are the three
things that the Netflow uses to consider the traffic
to be in a same flow?
A. IP address
C. Port numbers
D. L3 protocol
E. MAC address
QUESTION NO: 8
A network interface
port has collision detection and carrier sensing enabled
on a shared twisted pair network. From this statement,
what is known about the network interface port?
A. This is
a 10 Mb/s switch port.
B. This is
a 100 Mb/s switch port.
C. This is
an Ethernet port operating at half duplex.
D. This is
an Ethernet port operating at full duplex.
E. This is
a port on a network interface card in a PC.
Ethernet networks built with switches and full-duplex
connections no longer utilize CSMA/CD. CSMA/CD is only
used in obsolete shared media Ethernet (which uses repeater
QUESTION NO: 9
A receiving host
computes the checksum on a frame and determines that
the frame is damaged. The frame is then discarded. At
which OSI layer did this happen?
D. data link
Data Link layer provides the physical transmission of
the data and handles error notification, network topology,
and flow control. The Data Link layer formats the message
into pieces, each called a data frame, and adds a customized
header containing the hardware destination and source
address. Protocols Data Unit (PDU) on Datalink layer
is called frame. According to this question the frame
is damaged and discarded which will happen at the Data
QUESTION NO: 10
Which of the following
correctly describe steps in the OSI data encapsulation
process? (Choose two.)
A. The transport
layer divides a data stream into segments and may add
reliability and flow control information.
B. The data
link layer adds physical source and destination addresses
and an FCS to the segment.
are created when the network layer encapsulates a frame
with source and destination host addresses and protocol-related
are created when the network layer adds Layer 3 addresses
and control information to a segment.
E. The presentation
layer translates bits into voltages for transmission
across the physical link.
Application Layer (Layer 7) refers to communications
services to applications and is the interface between
the network and the application. Examples include. Telnet,
HTTP, FTP, Internet browsers, NFS, SMTP gateways, SNMP,
X.400 mail, and FTAM.
Presentation Layer (Layer 6) defining data formats,
such as ASCII text, EBCDIC text, binary, BCD, and JPEG.
Encryption also is defined as a presentation layer service.
ASCII, EBCDIC, TIFF, GIF, PICT, encryption, MPEG, and
Session Layer (Layer 5) defines how to start, control,
and end communication sessions. This includes the control
and management of multiple bidirectional messages so
that the application can be notified if only some of
a series of messages are completed. This allows the
presentation layer to have a seamless view of an incoming
stream of data. The presentation layer can be presented
with data if all flows occur in some cases. Examples
include. RPC, SQL, NFS, NetBios names, AppleTalk ASP,
and DECnet SCP
Transport Layer (Layer 4) defines several functions,
including the choice of protocols. The most important
Layer 4 functions are error recovery and flow control.
The transport layer may provide for retransmission,
i.e., error recovery, and may use flow control to prevent
unnecessary congestion by attempting to send data at
a rate that the network can accommodate, or it might
not, depending on the choice of protocols. Multiplexing
of incoming data for different flows to applications
on the same host is also performed. Reordering of the
incoming data stream when packets arrive out of order
is included. Examples include. TCP, UDP, and SPX.
Network Layer (Layer 3) defines end-to-end delivery
of packets and defines logical addressing to accomplish
this. It also defines how routing works and how routes
are learned; and how to fragment a packet into smaller
packets to accommodate media with smaller maximum transmission
unit sizes. Examples include. IP, IPX, AppleTalk DDP,
and ICMP. Both IP and IPX define logical addressing,
routing, the learning of routing information, and end-to-end
delivery rules. The IP and IPX protocols most closely
match the OSI network layer (Layer 3) and are called
Layer 3 protocols because their functions most closely
match OSI's Layer 3.
Data Link Layer (Layer 2) is concerned with getting
data across one particular link or medium.
data link protocols define delivery across an individual
link. These protocols are necessarily concerned with
the type of media in use. Examples includE. IEEE 802.3/802.2,
HDLC, Frame Relay, PPP, FDDI, ATM, and IEEE 802.5/802.2.
QUESTION NO: 11
Which protocol can
cause overload on a CPU of a managed device?
C. IP SLA
QUESTION NO: 12
What are the benefit
of using Netflow? (Choose three.)
Application & User Monitoring
QUESTION NO: 13
Which three statements
accurately describe Layer 2 Ethernet switches? (Choose
Tree Protocol allows switches to automatically share
VLANs increases the number of broadcast domains.
that are configured with VLANs make forwarding decisions
based on both Layer 2 and Layer 3 address information.
decreases the number of collisions on the network.
E. In a properly
functioning network with redundant switched paths, each
switched segment will contain one root bridge with all
its ports in the forwarding state. All other switches
in that broadcast domain will have only one root port.
F. If a switch
receives a frame for an unknown destination, it uses
ARP to resolve the address.
Microsegmentation is a network design (functionality)
where each workstation or device on a network gets its
own dedicated segment (collision domain) to the switch.
Each network device gets the full bandwidth of the segment
and does not have to share the segment with other devices.
Microsegmentation reduces and can even eliminate collisions
because each segment is its own collision domain ->
Microsegmentation decreases the number of collisions
but it increases the number of collision domains.
QUESTION NO: 14
Where does routing
occur within the DoD TCP/IP reference model?
QUESTION NO: 15
Syslog was configured
with a level 3 trap. Which 3 types of logs would be
generated (choose three)
QUESTION NO: 16
For what two purposes
does the Ethernet protocol use physical addresses? (Choose
A. to uniquely
identify devices at Layer 2
B. to allow
communication with devices on a different network
C. to differentiate
a Layer 2 frame from a Layer 3 packet
D. to establish
a priority system to determine which device gets to
E. to allow
communication between different devices on the same
F. to allow
detection of a remote device when its physical address
addresses or MAC addresses are used to identify devices
at layer 2.
addresses are only used to communicate on the same network.
To communicate on different network we have to use Layer
3 addresses (IP addresses) -> B is not correct.
2 frame and Layer 3 packet can be recognized via headers.
Layer 3 packet also contains physical address ->
Ethernet, each frame has the same priority to transmit
by default ->
devices need a physical address to identify itself.
If not, they can not communicate ->
QUESTION NO: 17
In an Ethernet network,
under what two scenarios can devices transmit? (Choose
A. when they
receive a special token
B. when there
is a carrier
C. when they
detect no other devices are sending
D. when the
medium is idle
E. when the
server grants access
network is a shared environment so all devices have
the right to access to the medium. If more than one
device transmits simultaneously, the signals collide
and can not reach the destination.
a device detects another device is sending, it will
wait for a specified amount of time before attempting
there is no traffic detected, a device will transmit
its message. While this transmission is occurring, the
device continues to listen for traffic or collisions
on the LAN. After the message is sent, the device returns
to its default listening mode.