Anda di halaman 1dari 16

CCNA 1 Chapter 1

1. Which two Internet solutions provide an always-on,

high-bandwidth connection to computers on a
LAN? (Choose two.)

dial-up telephone

2. What type of network must a home user access in
order to do online shopping?

a local area network
the Internet
an extranet
an intranet

3. What are two functions of intermediary devices on
a network? (Choose two.)

They are the primary source and providers of information and
services to end devices.
They form the interface between the human network and the
underlying communication network.
They direct data along alternate pathways when there is a
link failure.
They run applications that support collaboration for business.
They filter the flow of data, based on security settings.

4. Fill in the blank.

The acronym BYOD refers to the trend of end users being
able to use their personal devices to access the business
network and resources.
5. Which description correctly defines a converged

a network that allows users to interact directly with each other
over multiple channels
a network that is limited to exchanging character-based
a dedicated network with separate channels for video and
voice services
a single network channel capable of delivering multiple
communication forms

Drag and drop
Match each characteristic to its corresponding internet
conectivity type.

satellite -> Not suited for heavily wooded areas
dialup telephone -> typically has very low bandwidth
DSL -> splits the access line into three signals
cable -> uses coaxial cable as a medium

Drag and drop
Match the form of network communication with its

Web pages that groups of people can edit and view together -
> wiki
Interactive websites where people created and share user-
generated content with friends and family -> Social media
real-time communication of between two or more people -
> instant messaging
an audio-based medium that allows people to deliver their
recordings to a wide audience -> podcast
8. Drag and drop
Match each definition to the corresponding security goal:

maintaining integrity -> the assurance that the information
has not been altered during transmission
ensuring confidentiality -> only the intended recipients can
access and read the data
ensuring availability -> the assurance of timely and reliable
access to data
9. Which statement describes a characteristic of cloud
A business can connect directly to the Internet without the use
of an ISP.
Devices can connect to the Internet through existing electrical
Investment in new infrastructure is required in order to access
the cloud.
Applications can be accessed over the Internet through a
10. Which two Internet connection options do not require
that physical cables be run to the building? (Choose two.)
dedicated leased line
11. What is a characteristic of circuit-switched networks?
A single message can be broken into multiple message blocks
that are transmitted through multiple circuits simultaneously.
If all circuits are busy, a new call cannot be placed.
If a circuit fails, the call will be forwarded on a new path.
Circuit-switched networks can dynamically learn and use
redundant circuits.
12. Requiring strong, complex passwords is a practice
that supports which network security goal?
maintaining communication integrity
ensuring redundancy
ensuring data confidentiality
ensuring reliability of access
13. What two criteria are used to help select network
media? (Choose two.)
the distance the media can successfully carry a signal
the environment where the media is to be installed
the cost of the end devices utilized in the network
the number of intermediary devices installed in the network
the types of data that need to be prioritized
14. Which statement describes a network that supports
Data sent over the network is not altered in transmission.
The fewest possible devices are affected by a failure.
The network provides predictable levels of service to
different types of traffic.
The network should be able to expand to keep up with user

Refer to the exhibit. Which set of devices contains only
intermediary devices?
A, B, E, F
A, B, D, G
G, H, I, J
C, D, G, I
16. Which device performs the function of determining the
path that messages should take through internetworks?
a web server
a DSL modem
a router
a firewall
17. Which tool provides real-time video and audio
communication over the Internet so that businesses can
conduct corporate meetings with participants from
several remote locations?
instant messaging
18. Which two statements about the relationship between
LANs and WANs are true? (Choose two.)
Both LANs and WANs connect end devices.
WANs are typically operated through multiple ISPs, but
LANs are typically operated by single organizations or
WANs connect LANs at slower speed bandwidth than
LANs connect their internal end devices.
The Internet is a WAN.
WANs must be publicly-owned, but LANs can be owned by
either public or private entities.
19. Which three network tools provide the minimum
required security protection for home users? (Choose
antivirus software
antispyware software
an intrusion prevention system
powerline networking
a firewall
access control lists
20. Which area of the network would a college IT staff
most likely have to redesign as a direct result of many
students bringing their own tablets and smartphones to
school to access school resources?
wired LAN
wireless LAN
wireless WAN
21. Which expression accurately defines the term
a method of limiting the impact of a hardware or software
failure on the network
a set of techniques to manage the utilization of network
a state where the demand on the network resources
exceeds the available capacity
a measure of the data carrying capacity of the network

CCNA 1 Chapter 2
1. Which statements correctly identify the role of
intermediary devices in the network? (Choose three.)
determine pathways for data
initiate data communications
retime and retransmit data signals
originate the flow of data
manage data flows
final termination point for data flow
2. Select the statements that are correct concerning
network protocols. (Choose three.)
define the structure of layer specific PDUs
dictate how to accomplish layer functions
outline the functions necessary for communications between
limit the need for hardware compatibility
require layer dependent encapsulations
eliminate standardization among vendors
3. What are two functions of encapsulation? (Choose
tracks delay between end devices
enables consistent network paths for communication
allows modification of the original data before transmission
identifies pieces of data as part of the same communication
ensures that data pieces can be directed to the correct
receiving end device

4. What is a primary function of the trailer
information added by the data link layer
supports error detection
ensures ordered arrival of data
provides delivery to correct destination
identifies the devices on the local network
assists intermediary devices with processing and path selection
5. Which two layers of the OSI model have the same
functions as the TCP/IP model Network Access Layer?
(Choose two.)
Data Link
6. What is a PDU?
corruption of a frame during transmission
data reassembled at the destination
retransmitted packets due to lost communication
a layer specific encapsulation
7. Which characteristic correctly refers to end devices
in a network?
manage data flows
originate data flow
retime and retransmit data signals
determine pathways for data

ccna 1 chapter 2
Refer to the exhibit. Cell A at IP address
has established an IP session with IP Phone 1 at IP
address Based upon the graphic, which
device type best describes the function of wireless
device Cell A?
the destination device
an end device
an intermediate device
a media device

ccna 1 chapter 2
Refer to the exhibit. Which three labels correctly
identify the network types for the network segments
that are shown? (Choose three.)
Network A WAN
Network B WAN
Network C LAN
Network B MAN
Network C WAN
Network A LAN
10. Which three statements best describe a Local Area
Network (LAN)? (Choose three.)
A LAN is usually in a single geographical area.
The network is administered by a single organization.
The connection between segments in the LAN is usually
through a leased connection.
The security and access control of the network are controlled
by a service provider.
A LAN provides network services and access to applications for
users within a common organization.
Each end of the network is generally connected to a
Telecommunication Service Provider (TSP).

ccna 1 chapter 2
Refer to the exhibit. Which networking term
describes the data interleaving process represented in
the graphic?
12. What is the primary purpose of Layer 4 port
to identify devices on the local media
to identify the hops between source and destination
to identify to the intermediary devices the best path through
the network
to identify the source and destination end devices that are
to identify the processes or services that are communicating
within the end devices
13. What device is considered an intermediary device?
file server
IP phone

ccna 1 chapter 2
Refer to the exhibit. Which term correctly identifies
the device type that is included in the area B?

ccna 1 chapter 2
Refer to the exhibit. What type of network is shown?
16. Which layer encapsulates the segment into
data link
17. What can be identified by examining the network
layer header?
the destination device on the local media
the destination host address
the bits that will be transferred over the media
the source application or process creating the data

ccna 1 chapter 2
Refer to the exhibit. Which set of devices contains
only end devices?
A, C, D
B, E, G, H
C, D, G, H, I, J
D, E, F, H, I, J
E, F, H, I, J
19. During the encapsulation process, what occurs at
the data link layer?
No address is added.
The logical address is added.
The physical address is added.
The process port number is added.
20. What is the purpose of the TCP/IP Network Access
path determination and packet switching
data presentation
reliability, flow control, and error detection
network media control
the division of segments into packets
21. What is the proper order of the layers of the OSI
model from the highest layer to the lowest layer?
physical, network, application, data link, presentation, session,
application, physical, session, transport, network, data link,
application, presentation, physical, session, data link,
transport, network
application, presentation, session, transport, network, data
link, physical
presentation, data link, session, transport, network, physical,

CCNA Exploration 1: Chapter 3 Exam Answers

CCNA Exploration 1: Chapter 3 Exam Answers
01. What application layer protocol is commonly used to
support for file transfers between a client and a server?
02. What are two forms of application layer software?
(Choose two.)
03. A network administrator is designing a network for a
new branch office of twenty-five users. What are the
advantages of using a client-server model? (Choose two.)
centralized administration
does not require specialized software
security is easier to enforce
lower cost implementation
provides a single point of failure
04. What is the purpose of resource records in DNS?
temporarily holds resolved entries
used by the server to resolve names
sent by the client to during a query
passes authentication information between the server
and client
05. What is the automated service that matches resource
names with the required IP address?
06. What three protocols operate at the Application layer
of the OSI model? (Choose three.)
07. What are three properties of peer-to-peer
applications? (Choose three.)
acts as both a client and server within the same
requires centralized account administration
hybrid mode includes a centralized directory of files
can be used in client-server networks
requires a direct physical connection between devices
centralized authentication is required
08. Which application layer protocols correctly match a
corresponding function? (Choose two.)
DNS dynamically allocates IP addresses to hosts
HTTP transfers data from a web server to a client
POP delivers email from the client to the server email
SMTP supports file sharing
Telnet provides a virtual connection for remote access
09. Which email components are used to forward mail
between servers? (Choose two.)
10. As compared to SSH, what is the primary
disadvantage of telnet?
not widely available
does not support encryption
consumes more network bandwidth
does not support authentication
11. Which statements are correct concerning the role of
the MTA in handling email? (Choose three.)
routes email to the MDA on other servers
receives email from the clients MUA
receives email via the POP3 protocol
passes email to the MDA for final delivery
uses SMTP to route email between servers
delivers email to clients via the POP3 protocol
12. Which two protocols are used to control the transfer of
web resources from a web server to a client browser?
(Choose two.)
13. A small home network has been installed to
interconnect three computers together for gaming and file
sharing. What two properties represent this network type?
(Choose two.)
User accounts are centralized.
Security is difficult to enforce.
Specialized operating system software is required.
File permissions are controlled by a single computer.
A computer that responds to a file sharing request is
functioning as a server.
14. Which layer of the OSI model supplies services that
allow user to interface with the network?

Refer to the exhibit. What is the destination port for the
communication that is represented on line 5?
16. What are two characteristics of peer-to-peer
networks? (Choose two.)
one way data flow
decentralized resources
centralized user accounts
resource sharing without a dedicated server
17. What application layer protocol describes the services
that are used for file sharing in Microsoft networks?
18. What are two characteristics of clients in data
networks? (Choose two.)
use daemons
initiate data exchanges
are repositories of data
may upload data to servers
listen for requests from servers
19. What is the role of the OSI application layer?
provides segmentation of data
provides encryption and conversion of data
provides the interface between the applications on either
end of the network
provides control of all the data flowing between the
source and destination devices
20. How does the application layer on a server usually
process multiple client request for services?
ceases all connections to the service
denies multiple connections to a single daemon
suspends the current connection to allow the new
uses support from lower layer functions to distinguish
between connections to the service

CCNA 1 Chapter 4 v5 0 Exam Answers 2014
February 28, 2014 by quocvuong Leave a Comment
What are two reasons for physical layer protocols to use
frame encoding techniques? (Choose two.)
to identify where the frame starts and ends*
to distinguish data bits from control bits*
to reduce the number of collisions on the media
to increase the media throughput
to provide better media error correction
Which statement is correct about multimode fiber?
Multimode fiber commonly uses a laser as a light source.
Multimode fiber cables carry signals from multiple connected
sending devices.
SC-ST patch cords are used with multimode fiber cables.
SC-SC patch cords are used with multimode fiber cables.*
Which layer of the OSI model is responsible for specifying
the encapsulation method used for specific types of
data link*
The throughput of a FastEthernet network is 80 Mb/s. The
traffic overhead for establishing sessions,
acknowledgments, and encapsulation is 15 Mb/s for the
same time period. What is the goodput for this network?
15 Mb/s
55 Mb/s
65 Mb/s*
95 Mb/s
80 Mb/s
A network administrator notices that some newly installed
Ethernet cabling is carrying corrupt and distorted data
signals. The new cabling was installed in the ceiling close
to fluorescent lights and electrical equipment. Which two
factors may interfere with the copper cabling and result in
signal distortion and data corruption? (Choose two.)
signal attenuation
extended length of cabling
What is the purpose of the FCS field in a frame?
to obtain the MAC address of the sending node
to verify the logical address of the sending node
to compute the CRC header for the data field
to determine if errors occurred in the transmission and
As data travels on the media in a stream of 1s and 0s how
does a receiving node identify the beginning and end of a
The transmitting node sends an out-of-band signal to the
receiver about the beginning of the frame.
The transmitting node sends a beacon to notify that a data
frame is attached.
The receiving node identifies the beginning of a frame by
seeing a physical address.
The transmitting node inserts start and stop bits into the
Which statement describes signaling at the physical
Sending the signals asynchronously means that they are
transmitted without a clock signal.*
Signaling is a method of converting a stream of data into a
predefined code.
Wireless encoding includes sending a series of clicks to delimit
the frames.
In signaling, a 1 always represents voltage and a 0 always
represents the absence of voltage.
A network administrator is designing the layout of a new
wireless network. Which three areas of concern should be
accounted for when building a wireless network? (Choose
mobility options
extensive cabling
coverage area*
packet collision
What is one main characteristic of the data link layer?
It converts a stream of data bits into a predefined code.
It shields the upper layer protocol from being aware of the
physical medium to be used in the communication.*
It accepts Layer 3 packets and decides the path by which to
forward a frame to a host on a remote network.
It generates the electrical or optical signals that represent the
1 and 0 on the media.
What is one advantage of using fiber optic cabling rather
than copper cabling?
It is easier to terminate and install than copper cabling.
It is able to be installed around sharp bends.
It is usually cheaper than copper cabling.
It is able to carry signals much farther than copper
Fill in the blank.
What acronym is used to reference the data link sublayer that
identifies the network layer protocol encapsulated in the
Why are two strands of fiber used for a single fiber optic
They allow for full-duplex connectivity.*
They prevent crosstalk from causing interference on the
They increase the speed at which the data can travel.
The two strands allow the data to travel for longer distances
without degrading.

Refer to the exhibit. The PC is connected to the console
port of the switch. All the other connections are made
through FastEthernet links. Which types of UTP cables
can be used to connect the devices?
1 crossover, 2 rollover, 3 straight-through
1 crossover, 2 straight-through, 3 rollover
1 rollover, 2 straight-through, 3 crossover*
1 rollover, 2 crossover, 3 straight-through
What is true concerning physical and logical topologies?
Physical topologies display the IP addressing scheme of each
Logical topologies determine the media access control
method used.*
Physical topologies are concerned with how a network
transfers frames.
The logical topology is always the same as the physical
Fill in the blank.
The term Bandwidth indicates the capacity of a medium to
carry data and it is typically measured in kilobits per second
(kb/s) or megabits per second (Mb/s).

Refer to the exhibit. What is wrong with the displayed
The untwisted length of each wire is too long.*
The wires are too thick for the connector that is used.
The jack used is an RJ-11 connector instead of an RJ-45
The cable is not shielded.
Fill in the blank with a number.
10,000,000,000 b/s can also be written as 10 Gb/s.
What are two characteristics of 802.11 wireless networks?
(Choose two.)
Collisions can exist in the networks. *
They are collision-free networks.
They use CSMA/CD technology.
Stations can transmit at any time.
They use CSMA/CA technology.*
A network administrator is required to upgrade wireless
access to end users in a building. To provide data rates
up to 1.3 Gb/s and still be backward compatible with older
devices, which wireless standard should be
How is the magnetic field cancellation effect enhanced in
UTP cables?
by decreasing the number of wires that are used to carry data
by increasing the thickness of the PVC sheath that encases all
the wires
by increasing and varying the number of twists in each
wire pair*
by increasing the thickness of the copper wires

Match the steps to the physical layer operations that
occur when data is sent from one node and received at
another node.