Introduction to Networks (version 6.00) – ITN Chapter 7 Exam Beta Answers 2018 100%

Last Updated on January 20, 2019 by Admin

Introduction to Networks (version 6.00) – ITN Chapter 7 Exam Beta Answers 2018 100%

Cisco CCNA 1 ITN v6.0 chapter 7 exam beta answers Routing and Switching (R&S) Introduction to Networks (ITN) (Version 6.00) collection year 2017, 2018 and 2019 Full 100%. CCNA 1 has been know as ITN. The following are the questions exam answers. Guarantee Passed 100%. CCNA 1 v6.0 chapter 7 exam beta answers has some new update from ITN version 6.0 without beta. You can review all chapter 7 exam beta answers. You will get passed scored 100% with this version 6.0. Good Luck for Cisco Netacad ITN v6.0 Exam or ITN Pilot version 6.0 !

This is the first release of this form for the CCNA R&S Introduction to Networks curriculum from Cisco Netacad.com. There are 27 items are available in ITN Chapter 7 Exam Beta. You will get only selected 18 items which are displayed in random sequence, while you take exam with Cisco Netacad.

  1. A message is sent to all hosts on a remote network. Which type of message is it?

    • limited broadcast
    • multicast
    • directed broadcast
    • unicast
      Explanation:

      A directed broadcast is a message sent to all hosts on a specific network. It is useful for sending a broadcast to all hosts on a nonlocal network. A multicast message is a message sent to a selected group of hosts that are part of a subscribing multicast group. A limited broadcast is used for a communication that is limited to the hosts on the local network. A unicast message is a message sent from one host to another.
  2. Which two parts are components of an IPv4 address? (Choose two.)

    • subnet portion
    • network portion
    • logical portion
    • host portion
    • physical portion
    • broadcast portion
      Explanation:

      An IPv4 address is divided into two parts: a network portion – to identify the specific network on which a host resides, and a host portion – to identify specific hosts on a network. A subnet mask is used to identify the length of each portion.
  3. How many bits are in an IPv4 address?

    • 32
    • 64
    • 128
    • 256
      Explanation:

      An IPv4 address is comprised of 4 octets of binary digits, each containing 8 bits, resulting in a 32-bit address.
  4. Which two things can be determined when given an IP address and subnet mask of an attached network device? (Choose two.)​

    • the last host address on a network
    • the default gateway of a specific network
    • the network address of a specific network
    • the prefix length of the next available network
    • The number of networks contained in the organization.
      Explanation:

      The subnet mask will provide the identification of the network portion and host portion of a specific network address. From this information the network address, host address and broadcast address of a specific network can be determined. The default gateway of a network can be one of many addresses and is not determined exactly from a subnet mask. The prefix length of the next available network will be determined from the network of the next available network. The number of networks contained in the organization could not be determined by an IP address and subnet mask.
  5. What is the purpose of the subnet mask in conjunction with an IP address?

    • to uniquely identify a host on a network
    • to identify whether the address is public or private
    • to determine the subnet to which the host belongs
    • to mask the IP address to outsiders
      Explanation:

      With the IPv4 address, a subnet mask is also necessary. A subnet mask is a special type of IPv4 address that coupled with the IP address determines the subnet of which the device is a member. ​
  6. What subnet mask is represented by the slash notation /20?

    • 255.255.255.248
    • 255.255.224.0
    • 255.255.240.0
    • 255.255.255.0
    • 255.255.255.192
      Explanation:

      The slash notation /20 represents a subnet mask with 20 1s. This would translate to: 11111111.11111111.11110000.0000, which in turn would convert into 255.255.240.0.
  7. What does the IP address 172.17.4.250/24 represent?

    • network address
    • multicast address
    • host address
    • broadcast address
      Explanation:

      The /24 shows that the network address is 172.17.4.0. The broadcast address for this network would be 172.17.4.255. Useable host addresses for this network are 172.17.4.1 through 172.17.4.254.
  8. What are three characteristics of multicast transmission? (Choose three.)

    • The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255.
    • A single packet can be sent to a group of hosts.
    • Multicast transmission can be used by routers to exchange routing information.
    • The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.
    • Computers use multicast transmission to request IPv4 addresses.
    • Multicast messages map lower layer addresses to upper layer addresses.
      Explanation:

      Broadcast messages consist of single packets that are sent to all hosts on a network segment. These types of messages are used to request IPv4 addresses, and map upper layer addresses to lower layer addresses. A multicast transmission is a single packet sent to a group of hosts and is used by routing protocols, such as OSPF and RIPv2, to exchange routes. The address range 224.0.0.0 to 224.0.0.255 is reserved for link-local addresses to reach multicast groups on a local network.
  9. Which IP address is a valid default gateway for a host on the 10.1.100.0/24 network?

    • 10.1.0.1
    • 10.1.100.254
    • 10.1.1.1
    • 10.0.0.1
      Explanation:

      A valid default gateway for the 10.1.100.0/24 network is an IP address within the network range of valid IP addresses, the range which is 10.1.100.1 through 10.1.100.254.
  10. To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?

    • 10.1.0.0
    • 10.0.0.0
    • 10.1.100.32
    • 10.1.100.0
      Explanation:

      The purpose of a subnet mask is to separate the network portion of the address from the host portion of the IP address. The network portion of the IP address is identified by all binary 1s in the subnet mask. Using a subnet mask of 255.255.0.0 identifies the first two octets of the IP address as the network portion.
  11. Which option shows the proper notation for an IPv6 address?

    • 2001,0db8,3c55,0015,abcd,ff13
    • 2001-0db8-3c55-0015-abcd-ff13
    • 2001.0db8.3c55.0015.abcd.ff13
    • 2001:0db8:3c55:0015::abcd:ff13
  12. What are three parts of an IPv6 global unicast address? (Choose three.)

    • an interface ID that is used to identify the local network for a particular host
    • a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP
    • a subnet ID that is used to identify networks inside of the local enterprise site
    • a global routing prefix that is used to identify the portion of the network address provided by a local administrator
    • an interface ID that is used to identify the local host on the network
      Explanation:

      There are three elements that make up an IPv6 global unicast address. A global routing prefix which is provided by an ISP, a subnet ID which is determined by the organization, and an interface ID which uniquely identifies the interface interface of a host.
  13. Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

    • encapsulation
    • translation
    • dual-stack
    • tunneling
      Explanation:

      The tunneling migration technique encapsulates an IPv6 packet inside an IPv4 packet. Encapsulation assembles a message and adds information to each layer in order to transmit the data over the network. Translation is a migration technique that allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. The dual-stack migration technique allows IPv4 and IPv6 protocol stacks to coexist on the same network simultaneously.
  14. What are two types of IPv6 unicast addresses? (Choose two.)

    • multicast
    • loopback
    • link-local
    • anycast
    • broadcast
      Explanation:

      Multicast, anycast, and unicast are types of IPv6 addresses. There is no broadcast address in IPv6. Loopback and link-local are specific types of unicast addresses.
  15. Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?

    • ARPv6
    • DHCPv6
    • ICMPv6
    • UDP
      Explanation:

      SLAAC uses ICMPv6 messages when dynamically assigning an IPv6 address to a host. DHCPv6 is an alternate method of assigning an IPv6 addresses to a host. ARPv6 does not exist. Neighbor Discovery Protocol (NDP) provides the functionality of ARP for IPv6 networks. UDP is the transport layer protocol used by DHCPv6.
  16. An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?

    • SLAAC
    • stateless DHCPv6
    • stateful DHCPv6
    • RA and EUI-64
      Explanation:

      Stateless DHCPv6 allows clients to use ICMPv6 Router Advertisement (RA) messages to automatically assign IPv6 addresses to themselves, but then allows these clients to contact a DHCPv6 server to obtain additional information such as the domain name and address of DNS servers. SLAAC does not allow the client to obtain additional information through DHCPv6, and stateful DHCPv6 requires that the client receive its interface address directly from a DHCPv6 server. RA messages, when combined with an EUI-64 interface identifier, are used to automatically create an interface IPv6 address, and are part of both SLAAC and stateless DHCPv6.
  17. Which two IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains? (Choose two.)

    • trunking
    • dual stack
    • encapsulation
    • tunneling
    • multiplexing
      Explanation:

      There are three techniques to allow IPv4 and IPv6 to co-exist on a network. Dual stack allows IPv4 and IPv6 to coexist on the same network segment. Dual stack devices run both IPv4 and IPv6 protocol stacks simultaneously. Tunneling is a method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is encapsulated inside an IPv4 packet, similar to other types of data. Network Address Translation 64 (NAT64) allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4.
  18. Which of these addresses is the shortest abbreviation for the IP address:

    3FFE:1044:0000:0000:00AB:0000:0000:0057?

    • 3FFE:1044::AB::57
    • 3FFE:1044::00AB::0057
    • 3FFE:1044:0:0:AB::57
    • 3FFE:1044:0:0:00AB::0057
    • 3FFE:1044:0000:0000:00AB::57
    • 3FFE:1044:0000:0000:00AB::0057
  19. What is indicated by a successful ping to the ::1 IPv6 address?

    • The host is cabled properly.
    • The default gateway address is correctly configured.
    • All hosts on the local link are available.
    • The link-local address is correctly configured.
    • IP is properly installed on the host.
      Explanation:

      The IPv6 address ::1 is the loopback address. A successful ping to this address means that the TCP/IP stack is correctly installed. It does not mean that any addresses are correctly configured.
  20. Which two things can be determined by using the ping command? (Choose two.)

    • the number of routers between the source and destination device
    • the IP address of the router nearest the destination device
    • the average time it takes a packet to reach the destination and for the response to return to the source
    • the destination device is reachable through the network
    • the average time it takes each router in the path between source and destination to respond
      Explanation:

      A ping command provides feedback on the time between when an echo request was sent to a remote host and when the echo reply was received. This can be a measure of network performance. A successful ping also indicates that the destination host was reachable through the network.
  21. A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?

    • when the router receives an ICMP Time Exceeded message
    • when the RTT value reaches zero
    • when the host responds with an ICMP Echo Reply message
    • when the value in the TTL field reaches zero
    • when the values of both the Echo Request and Echo Reply messages reach zero
      Explanation:

      When a router receives a traceroute packet, the value in the TTL field is decremented by 1. When the value in the field reaches zero, the receiving router will not forward the packet, and will send an ICMP Time Exceeded message back to the source.
  22. Which protocol is used by IPv4 and IPv6 to provide error messaging?

    • ICMP
    • NDP
    • ARP
    • DHCP
      Explanation:

      ICMP is used by IPv4 and IPv6 to provide for messages to be sent in the event of certain errors and for informational purposes.
  23. Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded?

    • network unreachable
    • time exceeded
    • protocol unreachable
    • port unreachable
      Explanation:

      ICMPv6 uses the hop limit field in the IPv6 packet header to determine if the packet has expired. If the hop limit field has reached zero, a router will send a time exceeded message back towards the source indicating that the router cannot forward the packet.
  24. Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.)

    • router solicitation
    • router advertisement
    • neighbor solicitation
    • neighbor advertisement
    • echo request
      Explanation:

      IPv6 uses neighbor solicitation (NS) and neighbor advertisement (NA) ICMPv6 messages for MAC address resolution.
  25. What message is sent by a host to check the uniqueness of an IPv6 address before using that address?

    • neighbor solicitation
    • ARP request
    • echo request
    • router solicitation
      Explanation:

      In IPv6, Duplicate Address Detection (DAD) is used in place of ARP. An IPv6 host performs DAD by sending a neighbor solicitation (NS) message to its own IPv6 address to ensure the uniqueness of the address prior to using it.
  26. Which ICMPv6 message type provides network addressing information to hosts that use SLAAC?

    • neighbor solicitation
    • router advertisement
    • neighbor advertisement
    • router solicitation
      Explanation:

      IPv6-enabled router interfaces send periodic router advertisement messages that provide addressing information to hosts that perform SLAAC.
  27. A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet?

    • when the value of the Hop Limit field reaches 255
    • when the value of the Hop Limit field reaches zero
    • when the router receives an ICMP time exceeded message
    • when the target host responds with an ICMP echo reply message
      Explanation:

      When a traceroute is performed, the value in the Hop Limit field of an IPv6 packet determines how many router hops the packet can travel. Once the Hop Limit field reaches a value of zero, it can no longer be forwarded and the receiving router will drop the packet.