Cisco Certified Network Associate CCNA
Questions, Answers, Braindumps (200-120)
www.examcheets.com. But there’s no need to have it
from both of them, only questions from only one are
sufficient I think.
QUESTION NO: 1
features are added in SNMPv3 over SNMPv2?
QUESTION NO: 2
In a GLBP network,
who is responsible for the arp request?
QUESTION NO: 3
Which layer in the
OSI reference model is responsible for determining the
availability of the receiving program and checking to see
if enough resources exist for that communication?
question is to examine the OSI reference model.
Application layer is responsible for identifying and
establishing the availability of the intended
communication partner and determining whether sufficient
resources for the intended communication exist.
QUESTION NO: 4
Which of the
following describes the roles of devices in a WAN? (Choose
A. A CSU/DSU
terminates a digital local loop.
B. A modem
terminates a digital local loop.
C. A CSU/DSU
terminates an analog local loop.
D. A modem
terminates an analog local loop.
E. A router
is commonly considered a DTE device.
F. A router
is commonly considered a DCE device.
QUESTION NO: 5
What is the alert
message generated by SNMP agents called ?
QUESTION NO: 6
administrator is verifying the configuration of a newly
installed host by establishing an FTP connection to a
remote server. What is the highest layer of the protocol
stack that the network administrator is using for this
F. data link
to Application layer and it is also the highest layer of
the OSI model.
QUESTION NO: 7
What are the three
things that the Netflow uses to consider the traffic to be
in a same flow?
A. IP address
QUESTION NO: 8
A network interface
port has collision detection and carrier sensing enabled
on a shared twisted pair network. From this statement,
what is known about the network interface port?
A. This is a
10 Mb/s switch port.
B. This is a
100 Mb/s switch port.
C. This is an
Ethernet port operating at half duplex.
D. This is an
Ethernet port operating at full duplex.
E. This is a
port on a network interface card in a PC.
Ethernet networks built with switches and full-duplex
connections no longer utilize CSMA/CD. CSMA/CD is only
used in obsolete shared media Ethernet (which uses
repeater or hub).
QUESTION NO: 9
A receiving host
computes the checksum on a frame and determines that the
frame is damaged. The frame is then discarded. At which
OSI layer did this happen?
D. data link
Link layer provides the physical transmission of the data
and handles error notification, network topology, and flow
control. The Data Link layer formats the message into
pieces, each called a data frame, and adds a customized
header containing the hardware destination and source
address. Protocols Data Unit (PDU) on Datalink layer is
called frame. According to this question the frame is
damaged and discarded which will happen at the Data Link
QUESTION NO: 10
Which of the
following correctly describe steps in the OSI data
encapsulation process? (Choose two.)
transport layer divides a data stream into segments and
may add reliability and flow control information.
B. The data
link layer adds physical source and destination addresses
and an FCS to the segment.
are created when the network layer encapsulates a frame
with source and destination host addresses and
protocol-related control information.
are created when the network layer adds Layer 3 addresses
and control information to a segment.
presentation layer translates bits into voltages for
transmission across the physical link.
Application Layer (Layer 7) refers to communications
services to applications and is the interface between the
network and the application. Examples include. Telnet,
HTTP, FTP, Internet browsers, NFS, SMTP gateways, SNMP,
X.400 mail, and FTAM.
Presentation Layer (Layer 6) defining data formats, such
as ASCII text, EBCDIC text, binary, BCD, and JPEG.
Encryption also is defined as a presentation layer
service. Examples include.
EBCDIC, TIFF, GIF, PICT, encryption, MPEG, and MIDI.
Layer (Layer 5) defines how to start, control, and end
communication sessions. This includes the control and
management of multiple bidirectional messages so that the
application can be notified if only some of a series of
messages are completed. This allows the presentation layer
to have a seamless view of an incoming stream of data. The
presentation layer can be presented with data if all flows
occur in some cases. Examples include. RPC, SQL, NFS,
NetBios names, AppleTalk ASP, and DECnet SCP
Transport Layer (Layer 4) defines several functions,
including the choice of protocols. The most important
Layer 4 functions are error recovery and flow control. The
transport layer may provide for retransmission, i.e.,
error recovery, and may use flow control to prevent
unnecessary congestion by attempting to send data at a
rate that the network can accommodate, or it might not,
depending on the choice of protocols. Multiplexing of
incoming data for different flows to applications on the
same host is also performed. Reordering of the incoming
data stream when packets arrive out of order is included.
Examples include. TCP, UDP, and SPX.
Layer (Layer 3) defines end-to-end delivery of packets and
defines logical addressing to accomplish this. It also
defines how routing works and how routes are learned; and
how to fragment a packet into smaller packets to
accommodate media with smaller maximum transmission unit
sizes. Examples include. IP, IPX, AppleTalk DDP, and ICMP.
Both IP and IPX define logical addressing, routing, the
learning of routing information, and end-to-end delivery
rules. The IP and IPX protocols most closely match the OSI
network layer (Layer 3) and are called Layer 3 protocols
because their functions most closely match OSI's Layer 3.
Link Layer (Layer 2) is concerned with getting data across
one particular link or medium.
link protocols define delivery across an individual link.
These protocols are necessarily concerned with the type of
media in use. Examples includE. IEEE 802.3/802.2, HDLC,
Frame Relay, PPP, FDDI, ATM, and IEEE 802.5/802.2.
QUESTION NO: 11
Which protocol can
cause overload on a CPU of a managed device?
C. IP SLA
QUESTION NO: 12
What are the benefit
of using Netflow? (Choose three.)
Application & User Monitoring
QUESTION NO: 13
statements accurately describe Layer 2 Ethernet switches?
Tree Protocol allows switches to automatically share VLAN
Establishing VLANs increases the number of broadcast
that are configured with VLANs make forwarding decisions
based on both Layer 2 and Layer 3 address information.
Microsegmentation decreases the number of collisions on
E. In a
properly functioning network with redundant switched
paths, each switched segment will contain one root bridge
with all its ports in the forwarding state. All other
switches in that broadcast domain will have only one root
F. If a
switch receives a frame for an unknown destination, it
uses ARP to resolve the address.
Microsegmentation is a network design (functionality)
where each workstation or device on a network gets its own
dedicated segment (collision domain) to the switch. Each
network device gets the full bandwidth of the segment and
does not have to share the segment with other devices.
Microsegmentation reduces and can even eliminate
collisions because each segment is its own collision
domain -> .
Microsegmentation decreases the number of collisions but
it increases the number of collision domains.
QUESTION NO: 14
Where does routing
occur within the DoD TCP/IP reference model?
QUESTION NO: 15
configured with a level 3 trap. Which 3 types of logs
would be generated (choose three)
QUESTION NO: 16
For what two
purposes does the Ethernet protocol use physical
addresses? (Choose two.)
uniquely identify devices at Layer 2
B. to allow
communication with devices on a different network
differentiate a Layer 2 frame from a Layer 3 packet
establish a priority system to determine which device gets
to transmit first
E. to allow
communication between different devices on the same
F. to allow
detection of a remote device when its physical address is
addresses or MAC addresses are used to identify devices at
addresses are only used to communicate on the same
network. To communicate on different network we have to
use Layer 3 addresses (IP addresses) -> B is not correct.
frame and Layer 3 packet can be recognized via headers.
Layer 3 packet also contains physical address ->
each frame has the same priority to transmit by default ->
need a physical address to identify itself. If not, they
can not communicate ->
QUESTION NO: 17
In an Ethernet
network, under what two scenarios can devices transmit?
A. when they
receive a special token
B. when there
is a carrier
C. when they
detect no other devices are sending
D. when the
medium is idle
E. when the
server grants access
network is a shared environment so all devices have the
right to access to the medium. If more than one device
transmits simultaneously, the signals collide and can not
reach the destination.
If a device
detects another device is sending, it will wait for a
specified amount of time before attempting to transmit.
is no traffic detected, a device will transmit its
message. While this transmission is occurring, the device
continues to listen for traffic or collisions on the LAN.
After the message is sent, the device returns to its
default listening mode.