ccna answer

18
CCNA 1 Chapter 1 1. Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.) cellular DSL satellite cable dial-up telephone 2. What type of network must a home user access in order to do online shopping? a local area network the Internet an extranet an intranet 3. What are two functions of intermediary devices on a network? (Choose two.) They are the primary source and providers of information and services to end devices. They form the interface between the human network and the underlying communication network. They direct data along alternate pathways when there is a link failure. They run applications that support collaboration for business. They filter the flow of data, based on security settings. 4. Fill in the blank. The acronym “BYODrefers to the trend of end users being able to use their personal devices to access the business network and resources. 5. Which description correctly defines a converged network? a network that allows users to interact directly with each other over multiple channels a network that is limited to exchanging character-based information a dedicated network with separate channels for video and voice services a single network channel capable of delivering multiple communication forms 6. Drag and drop Match each characteristic to its corresponding internet conectivity type.

Upload: sakinah-mhd-shukree

Post on 26-Dec-2015

326 views

Category:

Documents


0 download

DESCRIPTION

ans

TRANSCRIPT

Page 1: Ccna Answer

CCNA 1 Chapter 1 1. Which two Internet solutions provide an always-on,

high-bandwidth connection to computers on a LAN? (Choose two.)

cellularDSLsatellitecabledial-up telephone

2. What type of network must a home user access in order to do online shopping?

a local area networkthe Internetan extranetan intranet

3. What are two functions of intermediary devices on a network? (Choose two.)

They are the primary source and providers of information and services to end devices.They form the interface between the human network and the underlying communication network.They direct data along alternate pathways when there is a link failure.They run applications that support collaboration for business.They filter the flow of data, based on security settings.

4. Fill in the blank.

The acronym “BYOD” refers to the trend of end users being able to use their personal devices to access the business network and resources.

5. Which description correctly defines a converged network?

a network that allows users to interact directly with each other over multiple channelsa network that is limited to exchanging character-based informationa dedicated network with separate channels for video and voice servicesa single network channel capable of delivering multiple communication forms

6.Drag and dropMatch each characteristic to its corresponding internet conectivity type.

satellite -> Not suited for heavily wooded areasdialup telephone -> typically has very low bandwidthDSL -> splits the access line into three signalscable -> uses coaxial cable as a medium

Page 2: Ccna Answer

7.Drag and dropMatch the form of network communication with its description.

Web pages that groups of people can edit and view together -> wikiInteractive websites where people created and share user-generated content with friends and family -> Social mediareal-time communication of between two or more people -> instant messagingan audio-based medium that allows people to deliver their recordings to a wide audience -> podcast8. Drag and dropMatch each definition to the corresponding security goal:

maintaining integrity -> the assurance that the information has not been altered during transmissionensuring confidentiality -> only the intended recipients can access and read the dataensuring availability -> the assurance of timely and reliable access to data9. Which statement describes a characteristic of cloud computing?A business can connect directly to the Internet without the use of an ISP.Devices can connect to the Internet through existing electrical wiring.Investment in new infrastructure is required in order to access the cloud.Applications can be accessed over the Internet through a subscription.10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)cellulardialupsatelliteDSLdedicated leased line11. What is a characteristic of circuit-switched networks?

Page 3: Ccna Answer

A single message can be broken into multiple message blocks that are transmitted through multiple circuits simultaneously.If all circuits are busy, a new call cannot be placed.If a circuit fails, the call will be forwarded on a new path.Circuit-switched networks can dynamically learn and use redundant circuits.12. Requiring strong, complex passwords is a practice that supports which network security goal?maintaining communication integrityensuring redundancyensuring data confidentialityensuring reliability of access13. What two criteria are used to help select network media? (Choose two.)the distance the media can successfully carry a signalthe environment where the media is to be installedthe cost of the end devices utilized in the networkthe number of intermediary devices installed in the networkthe types of data that need to be prioritized14. Which statement describes a network that supports QoS?Data sent over the network is not altered in transmission.The fewest possible devices are affected by a failure.The network provides predictable levels of service to different types of traffic.The network should be able to expand to keep up with user demand.15.

Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, E, FA, B, D, GG, H, I, JC, D, G, I16. Which device performs the function of determining the path that messages should take through internetworks?a web servera DSL modema routera firewall17. Which tool provides real-time video and audio communication over the Internet so that businesses can conduct corporate meetings with participants from several remote locations?

Page 4: Ccna Answer

wikiinstant messagingweblogTelePresence18. Which two statements about the relationship between LANs and WANs are true? (Choose two.)Both LANs and WANs connect end devices.WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals.WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.The Internet is a WAN.WANs must be publicly-owned, but LANs can be owned by either public or private entities.19. Which three network tools provide the minimum required security protection for home users? (Choose three.)antivirus softwareantispyware softwarean intrusion prevention systempowerline networkinga firewallaccess control lists20. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?intranetwired LANwireless LANextranetwireless WAN21. Which expression accurately defines the term congestion?

a method of limiting the impact of a hardware or software failure on the networka set of techniques to manage the utilization of network resourcesa state where the demand on the network resources exceeds the available capacitya measure of the data carrying capacity of the network

CCNA 1 Chapter 2

1. Which statements correctly identify the role of

intermediary devices in the network? (Choose

three.)

determine pathways for data

initiate data communications

retime and retransmit data signals

originate the flow of data

manage data flows

final termination point for data flow

2. Select the statements that are correct

concerning network protocols. (Choose three.)

define the structure of layer specific PDU’s 

dictate how to accomplish layer functions

outline the functions necessary for communications

between layers 

limit the need for hardware compatibility

Page 5: Ccna Answer

require layer dependent encapsulations 

eliminate standardization among vendors

3. What are two functions of encapsulation?

(Choose two.)

tracks delay between end devices

enables consistent network paths for communication

allows modification of the original data before

transmission

identifies pieces of data as part of the same

communication 

ensures that data pieces can be directed to the

correct receiving end device

4. What is a primary function of the trailer

information added by the data link layer

encapsulation?

supports error detection 

ensures ordered arrival of data

provides delivery to correct destination

identifies the devices on the local network

assists intermediary devices with processing and path

selection

5. Which two layers of the OSI model have the

same functions as the TCP/IP model Network

Access Layer? (Choose two.)

Network

Transport

Physical 

Data Link

Session

6. What is a PDU?

corruption of a frame during transmission

data reassembled at the destination

retransmitted packets due to lost communication

a layer specific encapsulation

7. Which characteristic correctly refers to end

devices in a network?

manage data flows

originate data flow 

retime and retransmit data signals

determine pathways for data

8.

 

Page 6: Ccna Answer

ccna 1 chapter 2

Refer to the exhibit. “Cell A” at IP address

10.0.0.34 has established an IP session with “IP

Phone 1″ at IP address 172.16.1.103. Based upon

the graphic, which device type best describes the

function of wireless device “Cell A?”

the destination device

an end device

an intermediate device

a media device

9.

 

ccna 1 chapter 2

Refer to the exhibit. Which three labels correctly

identify the network types for the network

segments that are shown? (Choose three.)

Network A — WAN

Network B — WAN

Network C — LAN

Network B — MAN

Network C — WAN

Network A – LAN

10. Which three statements best describe a Local

Area Network (LAN)? (Choose three.)

A LAN is usually in a single geographical area.

The network is administered by a single organization.

The connection between segments in the LAN is

usually through a leased connection.

The security and access control of the network are

controlled by a service provider.

Page 7: Ccna Answer

A LAN provides network services and access to

applications for users within a common organization.

Each end of the network is generally connected to a

Telecommunication Service Provider (TSP).

11.

 

ccna 1 chapter 2

Refer to the exhibit. Which networking term

describes the data interleaving process

represented in the graphic?

piping

PDU

streaming

multiplexing

encapsulation

12. What is the primary purpose of Layer 4 port

assignment?

to identify devices on the local media

to identify the hops between source and destination

to identify to the intermediary devices the best path

through the network

to identify the source and destination end devices that

are communicating

to identify the processes or services that are

communicating within the end devices

13. What device is considered an intermediary

device?

file server

IP phone

laptop

printer

switch

14.

Page 8: Ccna Answer

ccna 1 chapter 2

Refer to the exhibit. Which term correctly

identifies the device type that is included in the

area B?

source

end

transfer

intermediary

15.

ccna 1 chapter 2

Refer to the exhibit. What type of network is

shown?

WAN

MAN

LAN

WLAN

16. Which layer encapsulates the segment into

packets?

physical

data link

network

transport

17. What can be identified by examining the

network layer header?

the destination device on the local media

the destination host address

Page 9: Ccna Answer

the bits that will be transferred over the media

the source application or process creating the data

18.

ccna 1 chapter 2

Refer to the exhibit. Which set of devices

contains only end devices?

A, C, D

B, E, G, H

C, D, G, H, I, J

D, E, F, H, I, J

E, F, H, I, J

19. During the encapsulation process, what

occurs at the data link layer?

No address is added.

The logical address is added.

The physical address is added.

The process port number is added.

20. What is the purpose of the TCP/IP Network

Access layer?

path determination and packet switching

data presentation

reliability, flow control, and error detection

network media control

the division of segments into packets

21. What is the proper order of the layers of the

OSI model from the highest layer to the lowest

layer?

physical, network, application, data link, presentation,

session, transport

application, physical, session, transport, network,

data link, presentation

application, presentation, physical, session, data link,

transport, network

application, presentation, session, transport, network,

data link, physical

presentation, data link, session, transport, network,

physical, application

CCNA Exploration 1: Chapter 3 Exam Answers

Page 10: Ccna Answer

CCNA Exploration 1: Chapter 3 Exam Answers01. What application layer protocol is commonly used to support for file transfers between a client and a server?

HTML HTTP FTP Telnet

02. What are two forms of application layer software? (Choose two.)

applications dialogs requests services syntax

03. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)

centralized administration does not require specialized software security is easier to enforce lower cost implementation provides a single point of failure

04. What is the purpose of resource records in DNS? temporarily holds resolved entries used by the server to resolve names sent by the client to during a query passes authentication information between the server

and client05. What is the automated service that matches resource names with the required IP address?

HTTP SSH

FQDN DNS Telnet SMTP

06. What three protocols operate at the Application layer of the OSI model? (Choose three.)

ARP DNS PPP SMTP POP ICMP

07. What are three properties of peer-to-peer applications? (Choose three.)

acts as both a client and server within the same communication

requires centralized account administration hybrid mode includes a centralized directory of files can be used in client-server networks requires a direct physical connection between devices centralized authentication is required

08. Which application layer protocols correctly match a corresponding function? (Choose two.)

DNS dynamically allocates IP addresses to hosts HTTP transfers data from a web server to a client POP delivers email from the client to the server email

server SMTP supports file sharing Telnet provides a virtual connection for remote access

09. Which email components are used to forward mail between servers? (Choose two.)

MDA

Page 11: Ccna Answer

IMAP MTA POP SMTP MUA

10. As compared to SSH, what is the primary disadvantage of telnet?

not widely available does not support encryption consumes more network bandwidth does not support authentication

11. Which statements are correct concerning the role of the MTA in handling email? (Choose three.)

routes email to the MDA on other servers receives email from the client’s MUA receives email via the POP3 protocol passes email to the MDA for final delivery uses SMTP to route email between servers delivers email to clients via the POP3 protocol

12. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)

ASP FTP HTML HTTP HTTPS IP

13. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.)

User accounts are centralized. Security is difficult to enforce. Specialized operating system software is required. File permissions are controlled by a single computer. A computer that responds to a file sharing request is

functioning as a server.14. Which layer of the OSI model supplies services that allow user to interface with the network?

physical session network presentation application transport

15.

Refer to the exhibit. What is the destination port for the communication that is represented on line 5?

80

Page 12: Ccna Answer

1261 15533 3912 65520

16. What are two characteristics of peer-to-peer networks? (Choose two.)

scalable one way data flow decentralized resources centralized user accounts resource sharing without a dedicated server

17. What application layer protocol describes the services that are used for file sharing in Microsoft networks?

DHCP DNS SMB SMTP Telnet

18. What are two characteristics of clients in data networks? (Choose two.)

use daemons initiate data exchanges are repositories of data may upload data to servers listen for requests from servers

19. What is the role of the OSI application layer? provides segmentation of data provides encryption and conversion of data provides the interface between the applications on either

end of the network provides control of all the data flowing between the

source and destination devices

20. How does the application layer on a server usually process multiple client request for services?

ceases all connections to the service denies multiple connections to a single daemon suspends the current connection to allow the new

connection uses support from lower layer functions to distinguish

between connections to the service

CCNA 1 Chapter 4 v5 0 Exam Answers 2014February 28, 2014 by quocvuong Leave a Comment1What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)to identify where the frame starts and ends*to distinguish data bits from control bits*to reduce the number of collisions on the mediato increase the media throughputto provide better media error correction2Which statement is correct about multimode fiber?Multimode fiber commonly uses a laser as a light source.Multimode fiber cables carry signals from multiple connected sending devices.SC-ST patch cords are used with multimode fiber cables.SC-SC patch cords are used with multimode fiber cables.*3Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?data link*applicationtransportphysical

Page 13: Ccna Answer

4The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 15 Mb/s for the same time period. What is the goodput for this network?15 Mb/s55 Mb/s65 Mb/s*95 Mb/s80 Mb/s5A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)RFI *signal attenuationcrosstalkEMI *extended length of cabling7What is the purpose of the FCS field in a frame?to obtain the MAC address of the sending nodeto verify the logical address of the sending nodeto compute the CRC header for the data fieldto determine if errors occurred in the transmission and reception*8As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?The transmitting node sends an out-of-band signal to the receiver about the beginning of the frame.

The transmitting node sends a beacon to notify that a data frame is attached.The receiving node identifies the beginning of a frame by seeing a physical address.The transmitting node inserts start and stop bits into the frame.*9Which statement describes signaling at the physical layer?Sending the signals asynchronously means that they are transmitted without a clock signal.*Signaling is a method of converting a stream of data into a predefined code.Wireless encoding includes sending a series of clicks to delimit the frames.In signaling, a 1 always represents voltage and a 0 always represents the absence of voltage.10A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)mobility optionsextensive cablingcoverage area*interference*packet collisionsecurity*11What is one main characteristic of the data link layer?It converts a stream of data bits into a predefined code.It shields the upper layer protocol from being aware of the physical medium to be used in the communication.*It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.

Page 14: Ccna Answer

It generates the electrical or optical signals that represent the 1 and 0 on the media.12What is one advantage of using fiber optic cabling rather than copper cabling?It is easier to terminate and install than copper cabling.It is able to be installed around sharp bends.It is usually cheaper than copper cabling.It is able to carry signals much farther than copper cabling.*13Fill in the blank.What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?“LLC”14Why are two strands of fiber used for a single fiber optic connection?They allow for full-duplex connectivity.*They prevent crosstalk from causing interference on the connection.They increase the speed at which the data can travel.The two strands allow the data to travel for longer distances without degrading.15

Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made

through FastEthernet links. Which types of UTP cables can be used to connect the devices?1 – crossover, 2 – rollover, 3 – straight-through1 – crossover, 2 – straight-through, 3 – rollover1 – rollover, 2 – straight-through, 3 – crossover*1 – rollover, 2 – crossover, 3 – straight-through16What is true concerning physical and logical topologies?Physical topologies display the IP addressing scheme of each network.Logical topologies determine the media access control method used.*Physical topologies are concerned with how a network transfers frames.The logical topology is always the same as the physical topology.17Fill in the blank.The term “Bandwidth” indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).18

Page 15: Ccna Answer

Refer to the exhibit. What is wrong with the displayed termination?The untwisted length of each wire is too long.*The wires are too thick for the connector that is used.The jack used is an RJ-11 connector instead of an RJ-45 connector.The cable is not shielded.19Fill in the blank with a number.10,000,000,000 b/s can also be written as    ”10”     Gb/s.20What are two characteristics of 802.11 wireless networks? (Choose two.)Collisions can exist in the networks. *They are collision-free networks.They use CSMA/CD technology.Stations can transmit at any time.They use CSMA/CA technology.*21A network administrator is required to upgrade wireless access to end users in a building. To provide data rates

up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?802.11n802.11ac*802.11g802.11b22How is the magnetic field cancellation effect enhanced in UTP cables?by decreasing the number of wires that are used to carry databy increasing the thickness of the PVC sheath that encases all the wiresby increasing and varying the number of twists in each wire pair*by increasing the thickness of the copper wires 23Match the steps to the physical layer operations that occur when data is sent from one node and received at another node.

Page 16: Ccna Answer