CCNA 1 ITNv6 Chapter 11: Check Your Understanding Answers

CCNA 1 v6.0 Chapter 11: Build a Small Network: Check your Understanding Answers

1. Why should the IP addressing scheme be carefully planned and documented? (Choose two.)

  • Improved network performance
  • Easier control of security
  • Easier troubleshooting
  • Reduction in network traffic
  • Elimination of requirement for subnetting

Explanation: By carefully planning and documenting the address space, troubleshooting, access control, and security are greatly simplified.

2. What would be considered an example of redundancy in network design? (Choose three.)

  • Installation of a switch that functions at both Layer 2 and Layer 3.
  • Installation of duplicate Layer 3 switches in a company network.
  • Installation of a switch with two separate power supplies.
  • Keeping a spare router that has already been properly configured.
  • Installation of multiple high-speed links to the company server farm.

Explanation: Redundancy is eliminating any single point of failure. This could include equipment or links. Keeping a configured device as a spare will assist in the troubleshooting process but is not considered redundancy. Additionally having a switch that functions at both Layer 2 and Layer 3 is still a single point of failure and is not considered redundancy.

3. Which type of traffic should be given the highest priority on a network?

  • Voice
  • SMTP
  • Instant messaging
  • FTP

Explanation: Voice traffic is very sensitive to delay and should be given the highest priority on the network.

4. Which planning and design factors would be considered as part of manageability focus when implementing a small network? (Choose two.)

  • Types of cable runs
  • Prioritization of data traffic
  • Upgrades to network devices
  • Number of interfaces required
  • IP addressing scheme
  • Bandwidth requirement

Explanation: The five focus areas when implementing a small network are cost, expandability, manageability, speed, and ports. Type of cable run would fall under cost, upgrades to network devices are part of expandability, prioritization of data traffic and IP addressing schemes are part of manageability, bandwidth requirement is part of speed, and number of interfaces required would be ports.

5. What is true of an application layer service?

  • Application layer services provide the human interface.
  • Application layer services interface with the network and prepare the data for transfer.
  • Application layer services include such things as email and web clients.
  • Application layer services are dependent on the OS vendor.

Explanation: Application layer services prepare the data for transfer over the network; they are based on standards and do not provide any sort of human interface. Application programs interface with the user.

6. Which network protocol should a network administrator use to remotely configure a network device?

  • FTP
  • FTPS
  • HTTP
  • Telnet
  • SSH

Explanation: FTP and FTPS allow files to be moved on the network. HTTP and HTTPS allow communication between a host and a web server. Telnet and SSH both allow remote login to a device. FTPS, HTTPS, and SSH are the secure versions of FTP, HTTP, and Telnet, respectively, and should be used whenever possible.

7. Fill in the blank.

____ allows users of analog phones to take advantage of the IP network.


8. What factors should be taken into account when using a protocol analyzer to determine traffic flow on a network? (Choose two.)

  • Always capture the traffic on the same network segment.
  • Capture traffic during peak utilization times.
  • Capture traffic on different network segments.
  • Capture traffic only during off-peak times.
  • Capture traffic during both peak and off-peak times.

Explanation: Traffic should be captured on different network segments during peak utilization times to ensure that all traffic types are collected.

9. A key network switch has failed because of excessive humidity. What type of physical threat caused the problem?

  • Hardware threat
  • Environmental threat
  • Electrical threat
  • Maintenance threat

Explanation: The key cause of the failure was high humidity, which is an environmental threat.

10. What is a network vulnerability?

  • The degree of weakness inherent in a network
  • Tools used to launch attacks against a network
  • Individuals interested and qualified in taking advantage of security weaknesses
  • Ping of death

Explanation: Vulnerabilities are inherent weaknesses in the network that can be exploited by people and tools.

11. The network administrator set the admin password on a new router to pa55w0rd. The security of the router was later compromised. What type of vulnerability allowed the attack?

  • Technology
  • Configuration
  • Policy

Explanation: Configuring easily guessed passwords creates a vulnerability that can easily be exploited.

12. Making illegal online purchases is what type of security threat?

  • Information theft
  • Identity theft
  • Data loss/manipulation
  • Disruption of service

Explanation: Making illegal online purchases by posing as another person is identity theft.

13. What name is given to a program that is disguised as another program to attack a system?

  • Virus
  • Trojan horse
  • Worm

Explanation: A virus is malicious software that is attached to another program to execute some unknown function. A Trojan horse is a program that is disguised as another program to trick the user into executing it. Worms are self-contained programs that attack a system to exploit a vulnerability.

14. An attacker runs a ping sweep against a network. What type of attack is this?

  • Reconnaissance
  • Access
  • Denial of service

Explanation: The attacker is using the ping sweep to gather information on the network, making this a reconnaissance attack.

15. What type of attack is a smurf attack?

  • Reconnaissance
  • Access
  • Denial of service

Explanation: A smurf attack overloads a network link by causing multiple Echo Replies to be directed against a target, making it a denial of service attack.

16. What is the order of steps recommended to mitigate a worm attack?

  • Containment > Inoculation > Quarantine > Treatment
  • Containment > Quarantine > Inoculation > Treatment
  • Containment > Quarantine > Treatment > Inoculation
  • Containment > Treatment > Quarantine > Inoculation

Explanation: The correct order is Containment > Inoculation > Quarantine > Treatment.

17. With regard to firewall technology, what is stateful packet inspection?

  • Incoming packets must be legitimate responses from internal requests.
  • The incoming packet must have been initiated from a trusted source.
  • The incoming packet must be in an active state before being admitted to the network.
  • Only secure traffic (SSH, HTTPS, and FTPS) is permitted through the firewall.

Explanation: With stateful packet inspection (SPI), only legitimate responses from internal requests are permitted through the firewall.

18. Which of the following is an example of a strong password?

  • Champion
  • Cisco123
  • 2#4@Tpg%
  • Eruces
  • Pa55w0rd

Explanation: Strong passwords should mix uppercase and lowercase text, numbers, and symbols into a random pattern that cannot be easily guessed.

19. How is “extended ping” entered on a Cisco router?

  • Type ping/e and press Enter
  • Type ping followed by a destination IP address
  • Type ping followed by a source IP address
  • Type ping and press Enter

Explanation: To enter extended ping mode, type ping and then press Enter.

20. What show command can be issued on a Cisco router to view the configuration register value?

  • show ip route
  • show running-config
  • show protocols
  • show version
  • show cdp neighbors detail

Explanation: The show version command will display the configuration register.

Notify of

Inline Feedbacks
View all comments