Data Comm and Networking 1 PQ1 Prelim Exam
Data Comm and Networking 1 PQ1 Prelim Exam
NETWORKING 1
Question 1
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which technology would be best to provide a home user with a highspeed, always-on
Internet connection?
Select one:
a.
Satellite
b.
Cellular
c.
Dial-up
d.
DSL
Feedback
Your answer is correct.
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of connection to a Cisco IOS switch is used to make the initial configuration?
Select one:
a.
AUX port
b.
Web interface
c.
SSH
d.
Console port
e.
Telnet
Feedback
Your answer is correct.
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
How is the Cisco IOS generally accessed and navigated?
Select one:
a.
With a Cisco-proprietary application
b.
Through the CLI using a terminal emulator
c.
By the use of a custom GUI
d.
Using a web browser
Feedback
Your answer is correct.
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a wiki?
Select one:
a.
an audio-based medium that is used to deliver information to a wide audience
b.
an online meeting
c.
a web page that groups of people can edit and review
d.
a personal journal that is posted on the internet
Feedback
Your answer is correct.
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What are the primary requirements of information security? (Choose three.)
c.
QoS
d.
Scalability
e.
Availability
Feedback
Your answer is correct.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An administrator has just changed the IP address of an interface on an IOS device. What
else must be done in order to apply those changes to the device?
Select one:
a.
Reload the device and type yes when prompted to save the configuration
b.
Copy the running configuration to the startup configuration file.
c.
Nothing must be done. Changes to the configuration on an IOS device take effect as soon
as the command is typed correctly and the Enter key has been pressed.
d.
Copy the information in the startup configuration file to the running configuration
Feedback
Your answer is correct.
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
To save time, IOS commands may be partially entered and then completed by typing which
key or key combination?
Select one:
a.
Up Arrow
b.
Tab
c.
Right Arrow
d.
Ctrl-N
e.
Ctrl-P
f.
Down Arrow
Feedback
Your answer is correct.
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a technician enter the command copy startup-config running config?
Select one:
a.
to save an active configuration to NVRAM
b.
to copy an existing configuration into RAM
c.
to make a changed configuration the new startup configuration
d.
to remove all configuration from the switch
Feedback
Your answer is correct.
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a group of web pages that groups of individuals can edit and view together called?
Select one:
a.
Podcasting
b.
Weblog (blog)
c.
Wiki
d.
Instant messaging
e.
TelePresence endpoint
f.
Access point
Feedback
Your answer is correct.
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of information would be found on a logical topology diagram?
Select one:
a.
IP addressing scheme
b.
Location of departmental switch
c.
Length and type of all cable runs
d.
Location of departmental printer
Feedback
Your answer is correct.
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP networks?
Select one:
a.
DNS server
b.
DHCP server
c.
local switch
d.
local router
Feedback
Your answer is correct.
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In which scenario would the use of a WISP be recommended
Select one:
a.
an apartment in a building with cable access to the Internet
b.
an Internet cafe in a city
c.
a farm in rural area without wired broadband access
d.
any home with multiple wireless devices
Feedback
Your answer is correct.
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which devices would be considered end devices on a network? (Choose four.)
b.
Server
c.
Tablet computer
d.
Printer
e.
Wireless access point
f.
IP phone
Feedback
Your answer is correct.
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What are two benefits of collaboration and video-on-demand applications? (Choose two.)
c.
providing better social media opportunities
d.
providing a richer e-learning environment
e.
providing faster, more secure business communications
f.
providing a richer e-learning environment
Feedback
Your answer is correct.
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
intranet
An Answer is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees of the
organization, or others with authorization.
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
a.
to test the performance on a particular LAN
b.
to provide automatic (unmanned) management of Cisco network devices
c.
to add a password to a Cisco network device
d.
to monitor the number of times a device has been powered on and of
Feedback
Your answer is correct.
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the primary defense against unauthorized remote access to network devices?
Select one:
a.
Configuring a default gateway
b.
Configuring an IP address
c.
Configuring a console password
d.
Configuring a VTY password
Feedback
Your answer is correct.
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Select one:
a.
password encryption
b.
Telnet access
c.
SVI
d.
physical switchport access
Feedback
Your answer is correct.
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of network design combines voice, video, and data on the same communication
channel?
Select one:
a.
a converged network
b.
an extranet
c.
a storage area network
d.
a traditional network
Feedback
Your answer is correct.
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device
using the CLI, what will be returned in the CLI?
Select one:
a.
EaSt-58(config)#
b.
EaSt-2+56(config)#
c.
Switch EaSt-2+56(config)#
d.
Switch(config)#
e.
% Invalid input detected
f.
East-2+56(config)#
Feedback
Your answer is correct.
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a fault-tolerant network?
Select one:
a.
A network that offers secure transactions
b.
A network that is incapable of failing
c.
A network that can reroute traffic in case of device failure
d.
A network that can provide priority treatment of voice and video traffic
Feedback
Your answer is correct.
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
scalable
A Answer network is able to expand to accept new devices and applications
without affecting performance.
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
During a routine inspection, a technician discovered that software that was installed on a
computer was secretly collecting data about websites that were visited by users of the
computer. Which type of threat is affecting this computer?
Select one:
a.
DoS attack
b.
zero – day attack
c.
identity theft
d.
spyware
Feedback
Your answer is correct.
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A network administer has forgotten the argument of an IOS command. How would the
administrator get help from the IOS CLI to complete the command correctly?
Select one:
a.
Type the command and then press the? key
b.
Type help and press the Enter key at the prompt
c.
Type the command and then press CTRL-C
d.
Type the command and then press the Tab key
e.
Type the command, type help, and press the Enter key.
Feedback
Your answer is correct.
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A data center has recently updated a physical server to host multiple operating systems on
a single CPU. The data center can now provide each customer with a separate web server
without having to allocate an actual discrete server for each customer. What is the network
trend that is being implemented by the data center in this situation?
Select one:
a.
virtualization
b.
maintaining communication integrity
c.
BYOD
d.
online collaboration
Feedback
Your answer is correct.
Question 26
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the Cisco IOS?
Select one:
a.
The memory for the Cisco network device
b.
The configuration for the Cisco network device
c.
The operating system for the Cisco network device
d.
The CPU for the Cisco network device
Feedback
Your answer is correct.
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following are disadvantages of peer-to-peer networking? (Choose two.)
b.
Scalability
c.
Expensive to set up and maintain
d.
No centralized administration
Feedback
Your answer is correct.
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
Select one:
a.
Keyword
b.
A space
c.
Command
d.
Argument
Feedback
Your answer is correct.
Question 29
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of traffic must receive the highest priority from QoS?
Select one:
a.
Order processing
b.
Email
c.
Web traffic
d.
VoIP
Feedback
Your answer is correct.
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What command will display a list of keywords available for viewing the status of an IOS
switch?
Select one:
a.
Switch# show?
b.
Switch# sh?
c.
Switch# help
d.
Switch# status?
Feedback
Your answer is correct.
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Where is the configuration used during startup on Cisco IOS devices located?
Select one:
a.
NVRAM
b.
Running config
c.
Startup config
d.
Terminal emulator
Feedback
Your answer is correct.
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a converged network?
Select one:
a.
A network where voice, video, and data move over the same infrastructure
b.
A network that makes use of both fiber-optic and copper connections
c.
A network that makes use of both wired and wireless technology
d.
A network that makes use of both wired and wireless technology
Feedback
Your answer is correct.
Question 33
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is encrypted with the enable secret command?
Select one:
a.
all configured passwords
b.
the privileged executive mode password
c.
the VTY line password
d.
the consoled line password
Feedback
Your answer is correct.
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
For which three reasons was a packet switched connectionless data communications
technology used when developing the Internet (Choose three.)
b.
it can rapidly adapt to the failure of network devices and communication links
c.
Network devices dynamically decide on the best available path to forward each packet.
d.
It requires that a data circuit between the source and destination be established before data
can be transferred.
e.
it allows for billing of network use by the amount of time a connection is established
Feedback
Your answer is correct.
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a.
Its maximum length is 255 characters.
b.
It does not allow spaces
c.
It must be registered with a DNS server
d.
It cannot start with a number
Feedback
Your answer is correct.
Question 36
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following are business-class Internet connection technologies normally
supplied by a service provider? (Choose two.)
b.
Broadband cable
c.
Leased lines
d.
Metro Ethernet
e.
Mobile services
Feedback
Your answer is correct.
Question 37
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a network that supports QoS?
Select one:
a.
The network should be able to expand to keep up with user demand
b.
The network provides predictable levels of service to different types of traffic
c.
The fewest possible devices are affected by a failure
d.
Data sent over the network is not altered in transmission
Feedback
Your answer is correct.
Question 38
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
What is a network infrastructure that provides access to other networks over a wide
geographic area?
Select one:
a.
SAN
b.
LAN
c.
WAN
d.
WLAN
e.
MAN
Feedback
Your answer is incorrect.
Question 39
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In which scenario would the use of a WISP be recommended?
Select one:
a.
an Internet cafe in a city
b.
an apartment in a building with cable access to the Internet
c.
a farm in a rural area without wired broadband access
d.
any home with multiple wireless devices
Feedback
Your answer is correct.
Question 40
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The farther you are from the central office when utilizing a DSL connection, the Answer
slow er
Question 1
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two message timing mechanisms are used in data communication? (Choose two.)
b.
encapsulation
c.
encoding
d.
flow control
e.
formatting
Feedback
Your answer is correct.
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two components are added to the PDU at the network access layer? (Choose two.)
b.
IP header
c.
HTTP header
d.
TCP header
e.
frame header
Feedback
Your answer is correct.
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which organization is responsible for developing communications standards for Voice over
IP (VoIP) devices?
Select one:
a.
The Telecommunications Industry Association (TIA)
b.
The Internet Corporation for Assigned Names and Numbers (ICANN)
c.
The Electronics Industry Alliance (EIA)
d.
The International Telecommunications Union-Telecommunications Standardization Sector
(ITU-T)
Feedback
Your answer is correct.
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
loop-back
A Answer address is defined as a reserved address that routes packets back to the
host
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What will a network administrator use to modify a configuration on a Cisco router?
Select one:
a.
a DHCP server
b.
a control panel
c.
the Windows command prompt
d.
IOS
e.
Windows Explorer
Feedback
Your answer is correct.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two factors influence the method that is used for media access control? (Choose
two.)
b.
how signals are encoded by the NICs on end devices
c.
how connection between nodes appears to the data link layer
d.
how data is generated by end devices applications
e.
how nodes share the media
Feedback
Your answer is correct.
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is and advantage of using standards to develop and implement protocols?
Select one:
a.
A particular protocol can be implemented by one manufacturer
b.
Standards provide flexibility for manufacturers to create devices that comply with unique
requirements
c.
Products from different manufacturers can interoperate successfully
d.
Different manufacturers are free to apply different requirements when implementing a
protocol
Feedback
Your answer is correct.
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the name given to a one-to-many message delivery option?
Select one:
a.
Multicast
b.
Unicast
c.
Broadcast
d.
Manycast
Feedback
Your answer is correct.
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What name is given to a group of interrelated protocols necessary to perform a
communication function?
Select one:
a.
Functional protocol
b.
Protocol suite
c.
Protocol stack
d.
Functional collection
Feedback
Your answer is correct.
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the transport layer PDU?
Select one:
a.
Frame
b.
Packet
c.
Data
d.
Segment
e.
Bit
Feedback
Your answer is correct.
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference
model? (Choose two.)
b.
TCP
c.
UDP
d.
DNS
e.
FTP
Feedback
Your answer is correct.
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What happens to frames that are too long or too short for the channel used?
Select one:
a.
They are broken up into smaller pieces.
b.
They are returned to the sender.
c.
They are delivered but much slower than proper-size frames.
d.
They clog the network and block the delivery of other frames.
e.
They are dropped.
Feedback
Your answer is correct.
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What happens when two devices on the same subnet are communicating?
Select one:
a.
The host portion of the IP addresses will be different
b.
The data link layer addresses are added to the IP header
c.
The sending device will use ARP to determine the IP address of the receiver
d.
The frame will be sent to the default gateway for delivery to the receiving device
Feedback
Your answer is correct.
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which application layer protocol allows users on one network to reliably transfer files to and
from a host on another network?
Select one:
a.
IMAP
b.
HTTP
c.
TFTP
d.
FTP
e.
DHCP
Feedback
Your answer is correct.
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which message delivery option is used when all devices need to receive the same message
simultaneously?
Select one:
a.
multicast
b.
unicast
c.
duplex
d.
broadcast
Feedback
Your answer is correct.
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which TCP/IP model layer is responsible for providing the best path through the network?
Select one:
a.
Application
b.
Network Access
c.
Transport
d.
Internet
Feedback
Your answer is correct.
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What command will prevent all unencrypted passwords from displaying in plain text in a
configuration file?
Select one:
a.
(config) # enable secret Secret_Password
b.
(config-line) # password secret
c.
(config) # enable secret Encrypted_Password
d.
(config)# enable password secret
e.
(config) # service password-encryption
Feedback
Your answer is correct.
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which OSI reference model layer is responsible for common representation of the data
transferred between application layer services?
Select one:
a.
Data link
b.
Transport
c.
Application
d.
Physical
e.
Session
f.
Presentation
g.
Network
Feedback
Your answer is correct.
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What three functions are defined by network protocols to allow communication between
known source and destination IP addresses? (Choose three.)
b.
message size
c.
connector specifications
d.
delivery options
e.
media selection
f.
data encoding
Feedback
Your answer is correct.
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of protocol describes communication over a data link and the physical
transmission of data on the network media?
Select one:
a.
Internet protocol
b.
Transport protocol
c.
Application protocol
d.
Network access protocol
Feedback
Your answer is correct.
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following elements do both human and computer communication systems
have in common? (Choose three.)
b.
Keyboard
c.
Source
d.
Default gateway
e.
Channel
Feedback
Your answer is correct.
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which logical address is used for delivery of data to a remote network?
Select one:
a.
destination port number
b.
destination IP address
c.
source IP address
d.
destination MAC address
e.
source MAC address
Feedback
Your answer is correct.
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which organization is responsible for the standard that defines Media Access Control for
wired Ethernet?
Select one:
a.
IAB
b.
ISO
c.
IEEE
d.
IETF
e.
ISOC
Feedback
Your answer is correct.
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following OSI model layers have the same functionality as the network access
layer in the TCP/IP model? (Choose two.)
b.
Physical
c.
Data link
d.
Application
e.
Session
f.
Transport
g.
Network
Feedback
Your answer is correct.
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What organization is responsible for the overall management and development of Internet
standards?
Select one:
a.
ISO
b.
IETF
c.
IAB
d.
IRTF
e.
IEEE
Feedback
Your answer is correct.
Question 26
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which message timing factor impacts how much information can be sent and the speed at
which it can be delivered?
Select one:
a.
Delay speed
b.
Access method
c.
Response timeout
d.
Flow control
Feedback
Your answer is correct.
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following are examples of proprietary protocols? (Choose two.)
b.
Novell NetWare
c.
AppleTalk
d.
ISO
Feedback
Your answer is correct.
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two statements are true regarding the user EXEC mode? (Choose two.)
b.
Interfaces and routing protocols can be configured
c.
All router commands are available
d.
Global configuration mode can be accessed by entering the enable command
e.
This is the default mode on an unconfigured router when first powered up.
Feedback
Your answer is correct.
Question 29
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is an advantage of using standards to develop and implement protocols?
Select one:
a.
A particular protocol can only be implemented by one manufacturer
b.
Products from different manufacturers can interoperate successfully
c.
Standard provide flexibility for manufacturers to create devices that comply with unique
requirements
d.
Different manufacturers are free to apply different requirements when implementing a
protocol
Feedback
Your answer is correct.
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two statements are true of the deterministic access method?(Choose two.)
b.
Devices take turns transmitting
c.
The order of transmission is dictated by the node that asks first for the token
d.
The throughput is predictable
e.
Each device has to transmit before passing the token to the next device
Feedback
Your answer is correct.
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement is correct about network protocols?
Select one:
a.
They are only required for exchange of message between devices on remote network
b.
Network protocols define the type of hardware that is used and how it is mounted in racks
c.
They all function in the network access layer of TCP/IP
d.
They define how messages are exchanged between the sources and the destination
Feedback
Your answer is correct.
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the purpose of protocols in data communications?
Select one:
a.
determining the electronic specifications to enable the communication
b.
specifying the bandwidth of the channel or medium for each type of communication
c.
providing the rules required for a specific type of communication to occur
d.
specifying the device operating systems that will support the communication
Feedback
Your answer is correct.
Question 33
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which organization develops the 802 family of standard for wired and wireless LANs and
MANs?
Select one:
a.
ITU-T
b.
ISOC
c.
IANA
d.
ISO
e.
IEEE
Feedback
Your answer is correct.
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which is a function of the Logical Link Control (LLC) sublayer?
Select one:
a.
to accept segments and package them into data units that are called packets
b.
to define the media access processes that are performed by the hardware
c.
to provide data link layer addressing
d.
to identify which network layer protocol is being used
Feedback
Your answer is correct.
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
light
In fiber optic meda, the signals are represented as patterns of Answer .
Question 1
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which interface command must be entered in a Layer 3 switch before IPv4 address can be
assigned to the interface?
Select one:
a.
noshutdown
b.
switchport
c.
ip classless
d.
no switchport
Feedback
Your answer is correct.
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An employee at a branch office is creating a quote for a customer. In order to do this, the
employee needs to access confidential pricing information from internal servers at the Head
Office. What type of network would the employee access?
Select one:
a.
an intranet
b.
an extranet
c.
a local area network
d.
the Internet
Feedback
Your answer is correct.
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two statements describe intermediary devices? (Choose two.)
b.
Intermediary devices alter data content.
c.
Intermediary devices direct the path of the data.
d.
Intermediary devices connect individual hosts to the network.
e.
Intermediary devices generate data content.
Feedback
Your answer is correct.
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What two criteria are used to help select a network medium from various network media?
(Choose two.)
b.
the environment where the selected medium is to be installed
c.
the cost of the end devices utilized in the network
d.
the distance the selected medium can successfully carry a signal
e.
the number of intermediary devices installed in the network
Feedback
Your answer is correct.
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In which scenario would the use of a WISP be recommended?
Select one:
a.
any home with multiple wireless devices
b.
an apartment in a building with cable access to the Internet
c.
an Internet cafe in a city
d.
a farm in a rural area without wired broadband access
Feedback
Your answer is correct.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What will a network administrator use to modify a configuration on a Cisco router?
Select one:
a.
b.
Windows Explorer
c.
IOS
d.
a DHCP server
e.
a control panel
Feedback
Your answer is correct.
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
MAC
The Ethernet Answer sublayer is responsible for communicating directly with
the physical layer.
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What command will prevent all unencrypted passwords from displaying in plain text in a
configuration file?
Select one:
a.
(config-line) # password secret
b.
(config)# enable password secret
c.
(config) # enable secret Secret_Password
d.
(config) # service password-encryption
e.
(config) # enable secret Encrypted_Password
Feedback
Your answer is correct.
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The farther you are from the central office when utilizing a DSL connection, the Answer
Slow er
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which term describes the state of a network when the demand on the network resources
exceeds the available capacity?
Select one:
a.
convergence
b.
optimization
c.
congestion
d.
synchronization
Feedback
Your answer is correct.
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Intranet
An Answer is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees of the
organization, or others with authorization.
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement is correct about network protocols?
Select one:
a.
They define how messages are exchanged between the sources and the destination
b.
They all function in the network access layer of TCP/IP
c.
They are only required for exchange of message between devices on remote network
d.
Network protocols define the type of hardware that is used and how it is mounted in racks
Feedback
Your answer is correct.
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Loopback
A Answer address is defined as a reserved address that routes packets back to the
host
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of address is 01-00-5E-0A-00-02?
Select one:
a.
an address that reaches every host inside a local subnet
b.
an address that reaches a specific group of hosts
c.
an address that reaches every host in the network
d.
an address that reaches one specific host
Feedback
Your answer is correct.
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which procedure is used to access a Cisco 2960 switch when performing an initial
configuration in a secure environment?
Select one:
a.
Use the console port to locally access the switch from a serial or USB interface of the PC.
b.
Use the AUX port to locally access the switch from a serial or USB interface of the PC
c.
Use Telnet to remotely access the switch through the network.
d.
Use Secure Shell to remotely access the switch through the network.
Feedback
Your answer is correct.
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two components are added to the PDU at the network access layer? (Choose two.)
b.
HTTP header
c.
Trailer
d.
TCP header
e.
IP header
Feedback
Your answer is correct.
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
During a routine inspection, a technician discovered that software that was installed on a
computer was secretly collecting data about websites that were visited by users of the
computer. Which type of threat is affecting this computer
Select one:
a.
spyware
b.
identity theft
c.
zero – day attack
d.
DoS attack
Feedback
Your answer is correct.
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a wiki?
Select one:
a.
an online meeting
b.
a web page that groups of people can edit and review
c.
a personal journal that is posted on the internet
d.
an audio-based medium that is used to deliver information to a wide audience
Feedback
Your answer is correct.
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two statements are true of the deterministic access method?(Choose two.)
b.
Devices take turns transmitting
c.
The order of transmission is dictated by the node that asks first for the token
d.
Each device has to transmit before passing the token to the next device
e.
The throughput is predictable
Feedback
Your answer is correct.
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two Internet connection options do not require that physical cables be run to the
building? (Choose two.)
b.
dialup
c.
cellular
d.
dedicated leased line
e.
DSL
Feedback
Your answer is correct.
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A router has a valid operating system and a configuration file stored in NVRAM. The
configuration file contains an enable secret password but no console password. When the
router boots up, which mode will display?
Select one:
a.
setup mode
b.
global configuration mode
c.
user EXEC mode
d.
privileged EXEC mode
Feedback
Your answer is correct.
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of communication will send a message to all devices on a local area network?
Select one:
a.
unicast
b.
broadcast
c.
allcast
d.
multicast
Feedback
Your answer is correct.
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A network administrator needs to keep the user ID, password, and session contents private
when establishing remote CLI connectivity with a switch to manage it. Which access method
should be chosen?
Select one:
a.
Telnet
b.
SSH
c.
AUX
d.
Console
Feedback
Your answer is correct.
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which message delivery option is used when all devices need to receive the same message
simultaneously?
Select one:
a.
duplex
b.
unicast
c.
multicast
d.
broadcast
Feedback
Your answer is correct.
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An administrator measured the transfer of usable data across a 100 Mb/s physical channel
over a given period of time and obtained 60 Mb/s. Which kind of measurement did the
administrator obtain
Select one:
a.
digital bandwidth
b.
latency
c.
throughput
d.
goodput
Feedback
Your answer is correct.
Question 26
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a network that supports QoS?
Select one:
a.
The network provides predictable levels of service to different types of traffic
b.
The network should be able to expand to keep up with user demand
c.
Data sent over the network is not altered in transmission
d.
The fewest possible devices are affected by a failure
Feedback
Your answer is correct.
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which area of the network would a college IT staff most likely have to redesign as a direct
result of many students bringing their own tablets and smartphones to school to access
school resources?
Select one:
a.
intranet
b.
wired LAN
c.
wireless LAN
d.
extranet
e.
wireless WAN
Feedback
Your answer is correct.
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A network administer has forgotten the argument of an IOS command. How would the
administrator get help from the IOS CLI to complete the command correctly?
Select one:
a.
Type the command and then press CTRL-C
b.
Type the command and then press the? key
c.
Type help and press the Enter key at the prompt
d.
Type the command, type help, and press the Enter key.
e.
Type the command and then press the Tab key
Feedback
Your answer is correct.
Question 29
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which command or key combination allows a user to return to the previous level in the
command hierarchy?
Select one:
a.
end
b.
Ctrl-Z
c.
Ctrl-C
d.
exit
Feedback
Your answer is correct.
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a characteristic of a WAN hub-and-spoke topology?
Select one:
a.
The branch sites are connected to a central site through point-point links
b.
it requires that every site be interconnected to each other through point to-point links
c.
All sites require a hub device that connects to a router
d.
It requires that some of the branch sites be interconnected through point-to-point links
Feedback
Your answer is correct.
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is an advantage of using standards to develop and implement protocols?
Select one:
a.
Different manufacturers are free to apply different requirements when implementing a
protocol
b.
Standard provide flexibility for manufacturers to create devices that comply with unique
requirements
c.
A particular protocol can only be implemented by one manufacturer
d.
Products from different manufacturers can interoperate successfully
Feedback
Your answer is correct.
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a.
It does not allow spaces
b.
It cannot start with a number
c.
Its maximum length is 255 characters.
d.
It must be registered with a DNS server
Feedback
Your answer is correct.
Question 33
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two statements are true regarding the user EXEC mode? (Choose two.)
b.
All router commands are available
c.
Global configuration mode can be accessed by entering the enable command
d.
Only some aspects of the router configuration can be viewed
e.
Interfaces and routing protocols can be configured
Feedback
Your answer is correct.
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is encrypted with the enable secret command?
Select one:
a.
the consoled line password
b.
the VTY line password
c.
all configured passwords
d.
the privileged executive mode password
Feedback
Your answer is correct.
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
To save time, IOS commands may be partially entered and then completed by typing which
key or key combination?
Select one:
a.
Up Arrow
b.
Right Arrow
c.
Down Arrow
d.
Ctrl-N
e.
Tab
f.
Ctrl-P
Feedback
Your answer is correct.
Question 36
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the function of the kernel of an operating software?
Select one:
a.
It provides a user interface that allows users to request a specific task.
b.
The kernel links the hardware drivers with the underlying electronics of a computer.
c.
The kernel provisions hardware resources to meet software requirements.
d.
It is an application that allows the initial configuration of a Cisco device.
Feedback
Your answer is correct.
Question 37
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement is correct about network protocols?
Select one:
a.
They all function in the network access layer of TCP/IP.
b.
They are only required for exchange of messages between devices on remote networks.
c.
They define how messages are exchanged between the source and the destination.
d.
Network protocols define the type of hardware that is used and how it is mounted in racks.
Feedback
Your answer is correct.
Question 38
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An administrator has just changed the IP address of an interface on an IOS device. What
else must be done in order to apply those changes to the device?
Select one:
a.
Nothing must be done. Changes to the configuration on an IOS device take effect as soon
as the command is typed correctly and the Enter key has been pressed.
b.
Copy the running configuration to the startup configuration file.
c.
Copy the information in the startup configuration file to the running configuration
d.
Reload the device and type yes when prompted to save the configuration
Feedback
Your answer is correct.
Question 39
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Scalable
A Answer network is able to expand to accept new devices and applications
without affecting performance.
Question 40
Correct
Mark 1.00 out of 1.00
Flag question
Question text
When is a wired connection preffered to a wireless connection by an end-user device?
Select one:
a.
when the end-user device will run an application that requires a dedicated connection to
the network
b.
when the end-user device is within range of a wireless signal
c.
when the end-user device will run an application that is delay tolerant
d.
when the end-user device only has a WLAN NIC
Feedback
Your answer is correct.
Question 41
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What method can be used by two computers to ensure that packets are not dropped
because too much data is being sent too quickly?
Select one:
a.
response timeout
b.
encapsulation
c.
access method
d.
flow control
Feedback
Your answer is correct.
Question 42
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of network design combines voice, video, and data on the same communication
channel?
Select one:
a.
a storage area network
b.
a converged network
c.
an extranet
d.
a traditional network
Feedback
Your answer is correct.
Question 43
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a technician enter the command copy startup-config running config?
Select one:
a.
to make a changed configuration the new startup configuration
b.
to save an active configuration to NVRAM
c.
to copy an existing configuration into RAM
d.
to remove all configuration from the switch
Feedback
Your answer is correct.
Question 44
Correct
Mark 1.00 out of 1.00
Flag question
Question text
For which three reasons was a packet switched connectionless data communications
technology used when developing the Internet (Choose three.)
b.
Data packets can travel through the network using multiple different paths
c.
it can rapidly adapt to the failure of network devices and communication links
d.
it allows for billing of network use by the amount of time a connection is established
e.
It requires that a data circuit between the source and destination be established before data
can be transferred.
Feedback
Your answer is correct.
Question 45
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which is a function of the Logical Link Control (LLC) sublayer?
Select one:
a.
to provide data link layer addressing
b.
to identify which network layer protocol is being used
c.
to define the media access processes that are performed by the hardware
d.
to accept segments and package them into data units that are called packets
Feedback
Your answer is correct.
Question 46
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two factors influence the method that is used for media access control? (Choose
two.)
b.
how nodes share the media
c.
how signals are encoded by the NICs on end devices
d.
how connection between nodes appears to the data link layer
e.
how the IP protocol forwards the packet to the destination
Feedback
Your answer is correct.
Question 47
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of delivery uses data link layer addresses?
Select one:
a.
remote delivery
b.
local delivery
c.
local and remote delivery
d.
remote delivery using routers
Feedback
Your answer is correct.
Question 48
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A data center has recently updated a physical server to host multiple operating systems on
a single CPU. The data center can now provide each customer with a separate web server
without having to allocate an actual discrete server for each customer. What is the network
trend that is being implemented by the data center in this situation?
Select one:
a.
virtualization
b.
maintaining communication integrity
c.
BYOD
d.
online collaboration
Feedback
Your answer is correct.
Question 49
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the purpose of protocols in data communications?
Select one:
a.
providing the rules required for a specific type of communication to occur
b.
specifying the bandwidth of the channel or medium for each type of communication
c.
determining the electronic specifications to enable the communication
d.
specifying the device operating systems that will support the communication
Feedback
Your answer is correct.
Question 50
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which PDU is processed when a host computer is de-encapsulating a message at
the transport layer of the TCP/IP model?
Select one:
a.
frame
b.
segment
c.
packet
d.
bits
Feedback
Your answer is correct.
Question 51
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a characteristic of the frame header fields of the data link layer?
Select one:
a.
They include information on user applications
b.
They vary depending on protocols
c.
They all include the flow control and logical connection fields
d.
Ethernet frame header fields contain Layer 3 source and destination addresses
Feedback
Your answer is correct.
Question 52
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What are two functions of end devices on a network? (Choose two.)
b.
They are the interface between humans and the communication network.
c.
They provide the channel over which the network message travels.
d.
They originate the data that flows through the network.
e.
They direct data over alternate paths in the event of link failures.
Feedback
Your answer is correct.
Question 53
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which organization develops the 802 family of standard for wired and wireless LANs and
MANs?
Select one:
a.
ISO
b.
IEEE
c.
ITU-T
d.
IANA
e.
ISOC
Feedback
Your answer is correct.
Question 54
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What are two benefits of collaboration and video-on-demand applications? (Choose two.)
b.
providing a richer e-learning environment
c.
ensuring a more reliable network
d.
providing faster, more secure business communications
e.
providing better social media opportunities
Feedback
Your answer is correct.
Question 55
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What process is used to place one message inside another message for transfer from the
source to the destination?
Select one:
a.
decoding
b.
access control
c.
flow control
d.
encapsulation
Feedback
Your answer is correct.
Question 56
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which logical address is used for delivery of data to a remote network?
Select one:
a.
destination MAC address
b.
destination IP address
c.
source IP address
d.
source MAC address
Feedback
Your answer is correct.
Question 57
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two connection options provide an always-on, high-bandwidth Internet connection
to computers in a home office? (Choose two.)
b.
cellular
c.
cable
d.
satellite
e.
dial-up telephone
Feedback
Your answer is correct.
Question 58
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which device performs the function of determining the path that messages should take
through internet works?
Select one:
a.
a DSL modem
b.
a web server
c.
a router
d.
a firewall
Feedback
Your answer is correct.
Question 59
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What happens when two devices on the same subnet are communicating?
Select one:
a.
The data link layer addresses are added to the IP header
b.
The frame will be sent to the default gateway for delivery to the receiving device
c.
The host portion of the IP addresses will be different
d.
The sending device will use ARP to determine the IP address of the receiver
Feedback
Your answer is correct.
Question 60
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a characteristic of a contention-based access method?
Select one:
a.
It is as nondeterministic method
b.
It has has mechanisms to the turns devices take to access the media
c.
It processes more overhead than the controlled access methods do
d.
It scales very well under heavy media use
Feedback
Your answer is correct.
Question 61
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What three functions are defined by network protocols to allow communication between
known source and destination IP addresses? (Choose three.)
b.
connector specifications
c.
message size
d.
delivery options
e.
data encoding
f.
media selection
Feedback
Your answer is correct.
Question 62
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A web client is sending a request for a webpage to a web server. From the perspective of
the client, what is the correct order of the protocol stack that is used to prepare the request
for transmission?
Select one:
a.
Ethernet, IP, TCP, HTTP
b.
HTTP, TCP, IP, Ethernet
c.
Ethernet, TCP, IP, HTTP
d.
HTTP, IP, TCP, Ethernet
Feedback
Your answer is correct.
Question 63
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Select one:
a.
password encryption
b.
Telnet access
c.
physical switchport access
d.
SVI
Feedback
Your answer is correct.
Question 64
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
a.
to test the performance on a particular LAN
b.
to add a password to a Cisco network device
c.
to monitor the number of times a device has been powered on and off
d.
to provide automatic (unmanned) management of Cisco network devices
Feedback
Your answer is correct.
Question 65
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP networks?
Select one:
a.
local router
b.
local switch
c.
DHCP server
d.
DNS server
Feedback
Your answer is correct.
Question 66
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two engineering organizations define open standards and protocols that apply to the
data link layer?
Select one:
a.
International Organization for Standardization (ISO)
b.
International Telecommunication Union (ITU)
c.
Internet Society (ISOC)
d.
Electronic Industries Alliance (EIA
e.
Internet Assigned Numbers Authority (IANA)
Feedback
Your answer is correct.
Question 67
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A company is contemplating whether to use a client/server or a peer-to-peer network. What
are three characteristics of a peer-to-peer network? (Choose three.)
b.
better device performance when acting as both client and server
c.
less cost to implement
d.
better security
e.
easy to create
f.
scalable
Feedback
Your answer is correct.
Question 68
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the purpose of the physical link control field in a data link layer header?
Select one:
a.
to indicate congestion in the media
b.
to establish a logical connection between nodes
c.
to establish the media link
d.
to start and stop traffic over the media
Feedback
Your answer is correct.
Question 69
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two message timing mechanisms are used in data communication? (Choose two.)
b.
formatting
c.
flow control
d.
encoding
e.
response timeout
Feedback
Your answer is correct.
Question 70
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Light
In fiber optic meda, the signals are represented as patterns of Answer .