1. Which two Internet solutions provide an always-on,
high-bandwidth connection to computers on a LAN? (Choose two.)
cellular DSL satellite cable dial-up telephone
2. What type of network must a home user access in order to do online shopping?
a local area network the Internet an extranet an intranet
3. What are two functions of intermediary devices on a network? (Choose two.)
They are the primary source and providers of information and services to end devices. They form the interface between the human network and the underlying communication network. They direct data along alternate pathways when there is a link failure. They run applications that support collaboration for business. They filter the flow of data, based on security settings.
4. Fill in the blank.
The acronym BYOD refers to the trend of end users being able to use their personal devices to access the business network and resources. 5. Which description correctly defines a converged network?
a network that allows users to interact directly with each other over multiple channels a network that is limited to exchanging character-based information a dedicated network with separate channels for video and voice services a single network channel capable of delivering multiple communication forms
6. Drag and drop Match each characteristic to its corresponding internet conectivity type.
satellite -> Not suited for heavily wooded areas dialup telephone -> typically has very low bandwidth DSL -> splits the access line into three signals cable -> uses coaxial cable as a medium
7. Drag and drop Match the form of network communication with its description.
Web pages that groups of people can edit and view together - > wiki Interactive websites where people created and share user- generated content with friends and family -> Social media real-time communication of between two or more people - > instant messaging an audio-based medium that allows people to deliver their recordings to a wide audience -> podcast 8. Drag and drop Match each definition to the corresponding security goal:
maintaining integrity -> the assurance that the information has not been altered during transmission ensuring confidentiality -> only the intended recipients can access and read the data ensuring availability -> the assurance of timely and reliable access to data 9. Which statement describes a characteristic of cloud computing? A business can connect directly to the Internet without the use of an ISP. Devices can connect to the Internet through existing electrical wiring. Investment in new infrastructure is required in order to access the cloud. Applications can be accessed over the Internet through a subscription. 10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) cellular dialup satellite DSL dedicated leased line 11. What is a characteristic of circuit-switched networks? A single message can be broken into multiple message blocks that are transmitted through multiple circuits simultaneously. If all circuits are busy, a new call cannot be placed. If a circuit fails, the call will be forwarded on a new path. Circuit-switched networks can dynamically learn and use redundant circuits. 12. Requiring strong, complex passwords is a practice that supports which network security goal? maintaining communication integrity ensuring redundancy ensuring data confidentiality ensuring reliability of access 13. What two criteria are used to help select network media? (Choose two.) the distance the media can successfully carry a signal the environment where the media is to be installed the cost of the end devices utilized in the network the number of intermediary devices installed in the network the types of data that need to be prioritized 14. Which statement describes a network that supports QoS? Data sent over the network is not altered in transmission. The fewest possible devices are affected by a failure. The network provides predictable levels of service to different types of traffic. The network should be able to expand to keep up with user demand. 15.
Refer to the exhibit. Which set of devices contains only intermediary devices? A, B, E, F A, B, D, G G, H, I, J C, D, G, I 16. Which device performs the function of determining the path that messages should take through internetworks? a web server a DSL modem a router a firewall 17. Which tool provides real-time video and audio communication over the Internet so that businesses can conduct corporate meetings with participants from several remote locations? wiki instant messaging weblog TelePresence 18. Which two statements about the relationship between LANs and WANs are true? (Choose two.) Both LANs and WANs connect end devices. WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices. The Internet is a WAN. WANs must be publicly-owned, but LANs can be owned by either public or private entities. 19. Which three network tools provide the minimum required security protection for home users? (Choose three.) antivirus software antispyware software an intrusion prevention system powerline networking a firewall access control lists 20. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? intranet wired LAN wireless LAN extranet wireless WAN 21. Which expression accurately defines the term congestion? a method of limiting the impact of a hardware or software failure on the network a set of techniques to manage the utilization of network resources a state where the demand on the network resources exceeds the available capacity a measure of the data carrying capacity of the network
CCNA 1 Chapter 2 1. Which statements correctly identify the role of intermediary devices in the network? (Choose three.) determine pathways for data initiate data communications retime and retransmit data signals originate the flow of data manage data flows final termination point for data flow 2. Select the statements that are correct concerning network protocols. (Choose three.) define the structure of layer specific PDUs dictate how to accomplish layer functions outline the functions necessary for communications between layers limit the need for hardware compatibility require layer dependent encapsulations eliminate standardization among vendors 3. What are two functions of encapsulation? (Choose two.) tracks delay between end devices enables consistent network paths for communication allows modification of the original data before transmission identifies pieces of data as part of the same communication ensures that data pieces can be directed to the correct receiving end device
4. What is a primary function of the trailer information added by the data link layer encapsulation? supports error detection ensures ordered arrival of data provides delivery to correct destination identifies the devices on the local network assists intermediary devices with processing and path selection 5. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.) Network Transport Physical Data Link Session 6. What is a PDU? corruption of a frame during transmission data reassembled at the destination retransmitted packets due to lost communication a layer specific encapsulation 7. Which characteristic correctly refers to end devices in a network? manage data flows originate data flow retime and retransmit data signals determine pathways for data 8.
ccna 1 chapter 2 Refer to the exhibit. Cell A at IP address 10.0.0.34 has established an IP session with IP Phone 1 at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device Cell A? the destination device an end device an intermediate device a media device 9.
ccna 1 chapter 2 Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.) Network A WAN Network B WAN Network C LAN Network B MAN Network C WAN Network A LAN 10. Which three statements best describe a Local Area Network (LAN)? (Choose three.) A LAN is usually in a single geographical area. The network is administered by a single organization. The connection between segments in the LAN is usually through a leased connection. The security and access control of the network are controlled by a service provider. A LAN provides network services and access to applications for users within a common organization. Each end of the network is generally connected to a Telecommunication Service Provider (TSP). 11.
ccna 1 chapter 2 Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic? piping PDU streaming multiplexing encapsulation 12. What is the primary purpose of Layer 4 port assignment? to identify devices on the local media to identify the hops between source and destination to identify to the intermediary devices the best path through the network to identify the source and destination end devices that are communicating to identify the processes or services that are communicating within the end devices 13. What device is considered an intermediary device? file server IP phone laptop printer switch 14.
ccna 1 chapter 2 Refer to the exhibit. Which term correctly identifies the device type that is included in the area B? source end transfer intermediary 15.
ccna 1 chapter 2 Refer to the exhibit. What type of network is shown? WAN MAN LAN WLAN 16. Which layer encapsulates the segment into packets? physical data link network transport 17. What can be identified by examining the network layer header? the destination device on the local media the destination host address the bits that will be transferred over the media the source application or process creating the data 18.
ccna 1 chapter 2 Refer to the exhibit. Which set of devices contains only end devices? A, C, D B, E, G, H C, D, G, H, I, J D, E, F, H, I, J E, F, H, I, J 19. During the encapsulation process, what occurs at the data link layer? No address is added. The logical address is added. The physical address is added. The process port number is added. 20. What is the purpose of the TCP/IP Network Access layer? path determination and packet switching data presentation reliability, flow control, and error detection network media control the division of segments into packets 21. What is the proper order of the layers of the OSI model from the highest layer to the lowest layer? physical, network, application, data link, presentation, session, transport application, physical, session, transport, network, data link, presentation application, presentation, physical, session, data link, transport, network application, presentation, session, transport, network, data link, physical presentation, data link, session, transport, network, physical, application
CCNA Exploration 1: Chapter 3 Exam Answers
CCNA Exploration 1: Chapter 3 Exam Answers 01. What application layer protocol is commonly used to support for file transfers between a client and a server? HTML HTTP FTP Telnet 02. What are two forms of application layer software? (Choose two.) applications dialogs requests services syntax 03. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.) centralized administration does not require specialized software security is easier to enforce lower cost implementation provides a single point of failure 04. What is the purpose of resource records in DNS? temporarily holds resolved entries used by the server to resolve names sent by the client to during a query passes authentication information between the server and client 05. What is the automated service that matches resource names with the required IP address? HTTP SSH FQDN DNS Telnet SMTP 06. What three protocols operate at the Application layer of the OSI model? (Choose three.) ARP DNS PPP SMTP POP ICMP 07. What are three properties of peer-to-peer applications? (Choose three.) acts as both a client and server within the same communication requires centralized account administration hybrid mode includes a centralized directory of files can be used in client-server networks requires a direct physical connection between devices centralized authentication is required 08. Which application layer protocols correctly match a corresponding function? (Choose two.) DNS dynamically allocates IP addresses to hosts HTTP transfers data from a web server to a client POP delivers email from the client to the server email server SMTP supports file sharing Telnet provides a virtual connection for remote access 09. Which email components are used to forward mail between servers? (Choose two.) MDA IMAP MTA POP SMTP MUA 10. As compared to SSH, what is the primary disadvantage of telnet? not widely available does not support encryption consumes more network bandwidth does not support authentication 11. Which statements are correct concerning the role of the MTA in handling email? (Choose three.) routes email to the MDA on other servers receives email from the clients MUA receives email via the POP3 protocol passes email to the MDA for final delivery uses SMTP to route email between servers delivers email to clients via the POP3 protocol 12. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.) ASP FTP HTML HTTP HTTPS IP 13. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.) User accounts are centralized. Security is difficult to enforce. Specialized operating system software is required. File permissions are controlled by a single computer. A computer that responds to a file sharing request is functioning as a server. 14. Which layer of the OSI model supplies services that allow user to interface with the network? physical session network presentation application transport 15.
Refer to the exhibit. What is the destination port for the communication that is represented on line 5? 80 1261 15533 3912 65520 16. What are two characteristics of peer-to-peer networks? (Choose two.) scalable one way data flow decentralized resources centralized user accounts resource sharing without a dedicated server 17. What application layer protocol describes the services that are used for file sharing in Microsoft networks? DHCP DNS SMB SMTP Telnet 18. What are two characteristics of clients in data networks? (Choose two.) use daemons initiate data exchanges are repositories of data may upload data to servers listen for requests from servers 19. What is the role of the OSI application layer? provides segmentation of data provides encryption and conversion of data provides the interface between the applications on either end of the network provides control of all the data flowing between the source and destination devices 20. How does the application layer on a server usually process multiple client request for services? ceases all connections to the service denies multiple connections to a single daemon suspends the current connection to allow the new connection uses support from lower layer functions to distinguish between connections to the service
CCNA 1 Chapter 4 v5 0 Exam Answers 2014 February 28, 2014 by quocvuong Leave a Comment 1 What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.) to identify where the frame starts and ends* to distinguish data bits from control bits* to reduce the number of collisions on the media to increase the media throughput to provide better media error correction 2 Which statement is correct about multimode fiber? Multimode fiber commonly uses a laser as a light source. Multimode fiber cables carry signals from multiple connected sending devices. SC-ST patch cords are used with multimode fiber cables. SC-SC patch cords are used with multimode fiber cables.* 3 Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? data link* application transport physical 4 The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 15 Mb/s for the same time period. What is the goodput for this network? 15 Mb/s 55 Mb/s 65 Mb/s* 95 Mb/s 80 Mb/s 5 A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.) RFI * signal attenuation crosstalk EMI * extended length of cabling 7 What is the purpose of the FCS field in a frame? to obtain the MAC address of the sending node to verify the logical address of the sending node to compute the CRC header for the data field to determine if errors occurred in the transmission and reception* 8 As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame? The transmitting node sends an out-of-band signal to the receiver about the beginning of the frame. The transmitting node sends a beacon to notify that a data frame is attached. The receiving node identifies the beginning of a frame by seeing a physical address. The transmitting node inserts start and stop bits into the frame.* 9 Which statement describes signaling at the physical layer? Sending the signals asynchronously means that they are transmitted without a clock signal.* Signaling is a method of converting a stream of data into a predefined code. Wireless encoding includes sending a series of clicks to delimit the frames. In signaling, a 1 always represents voltage and a 0 always represents the absence of voltage. 10 A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.) mobility options extensive cabling coverage area* interference* packet collision security* 11 What is one main characteristic of the data link layer? It converts a stream of data bits into a predefined code. It shields the upper layer protocol from being aware of the physical medium to be used in the communication.* It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network. It generates the electrical or optical signals that represent the 1 and 0 on the media. 12 What is one advantage of using fiber optic cabling rather than copper cabling? It is easier to terminate and install than copper cabling. It is able to be installed around sharp bends. It is usually cheaper than copper cabling. It is able to carry signals much farther than copper cabling.* 13 Fill in the blank. What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame? LLC 14 Why are two strands of fiber used for a single fiber optic connection? They allow for full-duplex connectivity.* They prevent crosstalk from causing interference on the connection. They increase the speed at which the data can travel. The two strands allow the data to travel for longer distances without degrading. 15
Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices? 1 crossover, 2 rollover, 3 straight-through 1 crossover, 2 straight-through, 3 rollover 1 rollover, 2 straight-through, 3 crossover* 1 rollover, 2 crossover, 3 straight-through 16 What is true concerning physical and logical topologies? Physical topologies display the IP addressing scheme of each network. Logical topologies determine the media access control method used.* Physical topologies are concerned with how a network transfers frames. The logical topology is always the same as the physical topology. 17 Fill in the blank. The term Bandwidth indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s). 18
Refer to the exhibit. What is wrong with the displayed termination? The untwisted length of each wire is too long.* The wires are too thick for the connector that is used. The jack used is an RJ-11 connector instead of an RJ-45 connector. The cable is not shielded. 19 Fill in the blank with a number. 10,000,000,000 b/s can also be written as 10 Gb/s. 20 What are two characteristics of 802.11 wireless networks? (Choose two.) Collisions can exist in the networks. * They are collision-free networks. They use CSMA/CD technology. Stations can transmit at any time. They use CSMA/CA technology.* 21 A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented? 802.11n 802.11ac* 802.11g 802.11b 22 How is the magnetic field cancellation effect enhanced in UTP cables? by decreasing the number of wires that are used to carry data by increasing the thickness of the PVC sheath that encases all the wires by increasing and varying the number of twists in each wire pair* by increasing the thickness of the copper wires
23 Match the steps to the physical layer operations that occur when data is sent from one node and received at another node.