0% found this document useful (0 votes)
72 views

Data Communication and Network 1

This document contains a quiz on data communication and network fundamentals. It consists of 24 multiple choice questions covering topics such as network device configuration, network infrastructure types, network security concepts, and Cisco IOS commands. The questions test knowledge of business-class internet connections, Cisco IOS startup configuration location, primary information security requirements, using Tab to autocomplete Cisco IOS commands, function of a WAN, logical topology diagram contents, wiki definition, recommended use of a WISP, primary defense against unauthorized remote access, displaying Cisco IOS show command keywords, definition of a scalable network, traffic type requiring highest QoS priority, definition of a fault-tolerant network, function of the Cisco IOS operating system,
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views

Data Communication and Network 1

This document contains a quiz on data communication and network fundamentals. It consists of 24 multiple choice questions covering topics such as network device configuration, network infrastructure types, network security concepts, and Cisco IOS commands. The questions test knowledge of business-class internet connections, Cisco IOS startup configuration location, primary information security requirements, using Tab to autocomplete Cisco IOS commands, function of a WAN, logical topology diagram contents, wiki definition, recommended use of a WISP, primary defense against unauthorized remote access, displaying Cisco IOS show command keywords, definition of a scalable network, traffic type requiring highest QoS priority, definition of a fault-tolerant network, function of the Cisco IOS operating system,
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 97

Data Communication and Network 1

Which of the following are business-class Internet connection technologies normally


supplied by a service provider? (Choose two.)

Select one or more:


a. Broadband cable
b. Cellular
c. Leased lines 
d. Metro Ethernet 

e. Mobile services
Feedback

Your answer is correct.


The correct answers are: Leased lines, Metro Ethernet

Question 2
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Where is the configuration used during startup on Cisco IOS devices located?

Select one:
a. NVRAM 
b. Terminal emulator
c. Running config

d. Startup config
Feedback

Your answer is incorrect.


The correct answer is: Startup config
Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What are the primary requirements of information security? (Choose three.)

Select one or more:


a. Integrity 
b. Confidentiality 
c. QoS
d. Scalability

e. Availability 
Feedback

Your answer is correct.


The correct answers are: Confidentiality, Integrity, Availability

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text

To save time, IOS commands may be partially entered and then completed by typing which
key or key combination?

Select one:
a. Down Arrow
b. Ctrl-P
c. Tab 
d. Right Arrow
e. Up Arrow

f. Ctrl-N
Feedback

Your answer is correct.


The correct answer is: Tab

Question 5
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What is a network infrastructure that provides access to other networks over a wide
geographic area?

Select one:
a. MAN
b. SAN     
c. WAN 
d. WLAN

e. LAN
Feedback

Your answer is incorrect.


The correct answer is: SAN     

Question 6
Correct
Mark 1.00 out of 1.00
Flag question

Question text

What type of information would be found on a logical topology diagram?

Select one:
a. Location of departmental printer
b. Location of departmental switch
c. Length and type of all cable runs

d. IP addressing scheme 


Feedback

Your answer is correct.


The correct answer is: IP addressing scheme

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a group of web pages that groups of individuals can edit and view together called?

Select one:
a. Access point
b. Weblog (blog)
c. Podcasting
d. Instant messaging
e. TelePresence endpoint

f. Wiki 
Feedback

Your answer is correct.


The correct answer is: Wiki

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

In which scenario would the use of a WISP be recommended?

Select one:
a. an Internet cafe in a city
b. a farm in a rural area without wired broadband access 
c. any home with multiple wireless devices

d. an apartment in a building with cable access to the Internet


Feedback

Your answer is correct.


The correct answer is: a farm in a rural area without wired broadband access

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the primary defense against unauthorized remote access to network devices?

Select one:
a. Configuring an IP address
b. Configuring a console password
c. Configuring a VTY password 

d. Configuring a default gateway


Feedback

Your answer is correct.


The correct answer is: Configuring a VTY password

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What command will display a list of keywords available for viewing the status of an IOS
switch?

Select one:
a. Switch# help
b. Switch# sh?
c. Switch# status?

d. Switch# show? 
Feedback

Your answer is correct.


The correct answer is: Switch# show?

Question 11
Correct
Mark 1.00 out of 1.00

Flag question
Question text

scalable
AAnswer  network is able to expand to accept new devices and applications without
affecting performance.

Feedback

The correct answer is: Scalable

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which type of traffic must receive the highest priority from QoS?

Select one:
a. Web traffic
b. VoIP 
c. Email

d. Order processing
Feedback

Your answer is correct.


The correct answer is: VoIP

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a fault-tolerant network?

Select one:
a. A network that can reroute traffic in case of device failure 
b. A network that can provide priority treatment of voice and video traffic
c. A network that is incapable of failing

d. A network that offers secure transactions


Feedback

Your answer is correct.


The correct answer is: A network that can reroute traffic in case of device failure

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the Cisco IOS?

Select one:
a. The memory for the Cisco network device
b. The CPU for the Cisco network device
c. The configuration for the Cisco network device

d. The operating system for the Cisco network device 


Feedback

Your answer is correct.


The correct answer is: The operating system for the Cisco network device

Question 15
Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are two benefits of collaboration and video-on-demand applications? (Choose two.)

Select one or more:


a. ensuring a more reliable network
b. providing faster, more secure business communications
c. providing a richer e-learning environment
d. providing a richer e-learning environment 
e. providing better social media opportunities 

f. providing data storage and retrieval to a business


Feedback

Your answer is correct.


The correct answers are: providing a richer e-learning environment, providing better social
media opportunities

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Intranet
AnAnswer  is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees of the
organization, or others with authorization.

Feedback

The correct answer is: Intranet


Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Why would a network administrator use the CLI of the Cisco IOS?

Select one:
a. to monitor the number of times a device has been powered on and of
b. to add a password to a Cisco network device 
c. to test the performance on a particular LAN

d. to provide automatic (unmanned) management of Cisco network devices


Feedback

Your answer is correct.


The correct answer is: to add a password to a Cisco network device

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text

During a routine inspection, a technician discovered that software that was installed on a
computer was secretly collecting data about websites that were visited by users of the
computer. Which type of threat is affecting this computer?

Select one:
a. zero – day attack
b. identity theft
c. spyware 
d. DoS attack
Feedback

Your answer is correct.


The correct answer is: spyware

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A network administer has forgotten the argument of an IOS command. How would the
administrator get help from the IOS CLI to complete the command correctly?

Select one:
a. Type the command and then press the Tab key
b. Type the command and then press the? key 
c. Type the command, type help, and press the Enter key.
d. Type the command and then press CTRL-C

e. Type help and press the Enter key at the prompt


Feedback

Your answer is correct.


The correct answer is: Type the command and then press the? key

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is initially entered at the CLI of the Cisco IOS when typing a command sequence?

Select one:
a. Argument
b. Command 
c. A space

d. Keyword  
Feedback

Your answer is correct.


The correct answer is: Command

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text

An administrator has just changed the IP address of an interface on an IOS device. What
else must be done in order to apply those changes to the device?

Select one:
a. Reload the device and type yes when prompted to save the configuration
b. Copy the information in the startup configuration file to the running configuration
c. Nothing must be done. Changes to the configuration on an IOS device take effect as
soon as the command is typed correctly and the Enter key has been pressed. 

d. Copy the running configuration to the startup configuration file.


Feedback

Your answer is correct.


The correct answer is: Nothing must be done. Changes to the configuration on an IOS
device take effect as soon as the command is typed correctly and the Enter key has been
pressed.

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What type of connection to a Cisco IOS switch is used to make the initial configuration?

Select one:
a. AUX port
b. Console port 
c. SSH
d. Web interface

e. Telnet
Feedback

Your answer is correct.


The correct answer is: Console port

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a wiki?

Select one:
a. an online meeting
b. a personal journal that is posted on the internet
c. an audio-based medium that is used to deliver information to a wide audience

d. a web page that groups of people can edit and review 
Feedback

Your answer is correct.


The correct answer is: a web page that groups of people can edit and review

Question 24
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Which statement describes a network that supports QoS?

Select one:
a. The network provides predictable levels of service to different types of traffic
b. Data sent over the network is not altered in transmission
c. The fewest possible devices are affected by a failure

d. The network should be able to expand to keep up with user demand 


Feedback

Your answer is incorrect.


The correct answer is: The network provides predictable levels of service to different types of
traffic

Question 25
Partially correct
Mark 0.67 out of 1.00

Flag question

Question text

For which three reasons was a packet switched connectionless data communications
technology used when developing the Internet (Choose three.)
Select one or more:
a. it allows for billing of network use by the amount of time a connection is established
b. It requires that a data circuit between the source and destination be established before
data can be transferred. 
c. it can rapidly adapt to the failure of network devices and communication links 
d. Network devices dynamically decide on the best available path to forward each packet.

e. Data packets can travel through the network using multiple different paths 
Feedback

Your answer is partially correct.


You have correctly selected 2.
The correct answers are: it can rapidly adapt to the failure of network devices and
communication links, Data packets can travel through the network using multiple different
paths, Network devices dynamically decide on the best available path to forward each
packet.

Question 26
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which technology would be best to provide a home user with a highspeed, always-on
Internet connection?

Select one:
a. Cellular
b. DSL 
c. Dial-up

d. Satellite
Feedback

Your answer is correct.


The correct answer is: DSL
Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a converged network?

Select one:
a. A network that makes use of both fiber-optic and copper connections
b. A network that makes use of both wired and wireless technology
c. A network where voice, video, and data move over the same infrastructure 

d. A network that makes use of both wired and wireless technology
Feedback

Your answer is correct.


The correct answer is: A network where voice, video, and data move over the same
infrastructure

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A technician configures a switch with these commands:


SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Select one:
a. physical switchport access
b. SVI 
c. Telnet access

d. password encryption
Feedback

Your answer is correct.


The correct answer is: SVI

Question 29
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which type of network design combines voice, video, and data on the same communication
channel?

Select one:
a. a traditional network
b. a storage area network
c. an extranet

d. a converged network 


Feedback

Your answer is correct.


The correct answer is: a converged network

Question 30
Correct
Mark 1.00 out of 1.00
Flag question

Question text

A data center has recently updated a physical server to host multiple operating systems on
a single CPU. The data center can now provide each customer with a separate web server
without having to allocate an actual discrete server for each customer. What is the network
trend that is being implemented by the data center in this situation?

Select one:
a. maintaining communication integrity
b. virtualization 
c. online collaboration

d. BYOD
Feedback

Your answer is correct.


The correct answer is: virtualization

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Why would a technician enter the command copy startup-config running config?

Select one:
a. to save an active configuration to NVRAM
b. to make a changed configuration the new startup configuration
c. to copy an existing configuration into RAM 

d. to remove all configuration from the switch


Feedback

Your answer is correct.


The correct answer is: to copy an existing configuration into RAM

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which statement describes a feature of an IOS host name configuration?

Select one:
a. It must be registered with a DNS server
b. It does not allow spaces 
c. It cannot start with a number

d. Its maximum length is 255 characters.


Feedback

Your answer is correct.


The correct answer is: It does not allow spaces

Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following are disadvantages of peer-to-peer networking? (Choose two.)

Select one or more:


a. Expensive to set up and maintain
b. Complex configuration
c. Scalability 

d. No centralized administration 


Feedback

Your answer is correct.


The correct answers are: No centralized administration, Scalability

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which devices would be considered end devices on a network? (Choose four.)

Select one or more:


a. Printer 
b. Tablet computer 
c. Switch
d. Wireless access point
e. Server 

f. IP phone 
Feedback

Your answer is correct.


The correct answers are: Printer, IP phone, Server, Tablet computer

Question 35
Correct
Mark 1.00 out of 1.00
Flag question

Question text

How is the Cisco IOS generally accessed and navigated?

Select one:
a. Using a web browser
b. Through the CLI using a terminal emulator 
c. By the use of a custom GUI

d. With a Cisco-proprietary application


Feedback

Your answer is correct.


The correct answer is: Through the CLI using a terminal emulator

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text

In which scenario would the use of a WISP be recommended

Select one:
a. an apartment in a building with cable access to the Internet

b. any home with multiple wireless devices


c. a farm in rural area without wired broadband access 

d. an Internet cafe in a city


Feedback
Your answer is correct.
The correct answer is: a farm in rural area without wired broadband access

Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text

When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device
using the CLI, what will be returned in the CLI?

Select one:
a. EaSt-58(config)#
b. Switch EaSt-2+56(config)#
c. Switch(config)#
d. EaSt-2+56(config)# 
e. East-2+56(config)#

f. % Invalid input detected


Feedback

Your answer is correct.


The correct answer is: EaSt-2+56(config)#

Question 38
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which device acts as gateway to allow hosts to send traffic to remote IP networks?
Select one:
a. DNS server
b. DHCP server
c. local router 

d. local switch
Feedback

Your answer is correct.


The correct answer is: local router

Question 39
Correct
Mark 1.00 out of 1.00

Flag question

Question text

slow er
Answer
 the connection speed

Feedback

The correct answer is: slower

Question 40
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is encrypted with the enable secret command?

Select one:
a. all configured passwords
b. the VTY line password
c. the consoled line password

d. the privileged executive mode password 


Feedback

Your answer is correct.


The correct answer is: the privileged executive mode password

QUIZ 2
Which logical address is used for delivery of data to a remote network?
Select one:

a. destination MAC address

b. destination IP address 

c. destination port number

d. source MAC address

e. source IP address

Feedback

Your answer is correct.

The correct answer is: destination IP address

Question 2
Incorrect

Mark 0.00 out of 1.00

Flag question
Question text

What organization is responsible for the overall management and development of Internet
standards?
Select one:

a. IAB

b. IEEE

c. IRTF

d. ISO

e. IETF 

Feedback

Your answer is incorrect.

The correct answer is: IAB

Question 3
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which application layer protocol allows users on one network to reliably transfer files to and
from a host on another network?
Select one:

a. TFTP 

b. FTP

c. DHCP
d. HTTP

e. IMAP

Feedback

Your answer is incorrect.

The correct answer is: FTP

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which TCP/IP model layer is responsible for providing the best path through the network?
Select one:

a. Application

b. Transport

c. Network Access

d. Internet 

Feedback

Your answer is correct.

The correct answer is: Internet

Question 5
Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which organization develops the 802 family of standard for wired and wireless LANs and
MANs?
Select one:

a. ISOC

b. IEEE 

c. IANA

d. ITU-T

e. ISO

Feedback

Your answer is correct.

The correct answer is: IEEE

Question 6
Partially correct

Mark 0.50 out of 1.00

Flag question

Question text

Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference


model? (Choose two.)
Select one or more:
a. FTP

b. TCP

c. UDP 

d. HTTP

e. DNS

Feedback

Your answer is partially correct.

You have correctly selected 1.

The correct answers are: TCP, UDP

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What three functions are defined by network protocols to allow communication between


known source and destination IP addresses? (Choose three.)
Select one or more:

a. connector specifications

b. message size 

c. data encoding 

d. delivery options 

e. media selection
f. end-device installation

Feedback

Your answer is correct.

The correct answers are: data encoding, message size, delivery options

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What name is given to a group of interrelated protocols necessary to perform a


communication function?
Select one:

a. Protocol stack

b. Protocol suite 

c. Functional collection

d. Functional protocol

Feedback

Your answer is correct.

The correct answer is: Protocol suite

Question 9
Correct

Mark 1.00 out of 1.00


Flag question

Question text

What is the name given to a one-to-many message delivery option?


Select one:

a. Broadcast

b. Unicast

c. Multicast 

d. Manycast

Feedback

Your answer is correct.

The correct answer is: Multicast

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which statement is correct about network protocols?


Select one:

a. They all function in the network access layer of TCP/IP

b. They are only required for exchange of message between devices on remote network
c. Network protocols define the type of hardware that is used and how it is mounted in
racks

d. They define how messages are exchanged between the sources and the destination 

Feedback

Your answer is correct.

The correct answer is: They define how messages are exchanged between the sources and
the destination

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which is a function of the Logical Link Control (LLC) sublayer?


Select one:

a. to identify which network layer protocol is being used 

b. to define the media access processes that are performed by the hardware

c. to accept segments and package them into data units that are called packets

d. to provide data link layer addressing

Feedback

Your answer is correct.

The correct answer is: to identify which network layer protocol is being used

Question 12
Incorrect

Mark 0.00 out of 1.00


Flag question

Question text

Which of the following OSI model layers have the same functionality as the network access
layer in the TCP/IP model? (Choose two.)
Select one or more:

a. Transport 

b. Data link

c. Network 

d. Application

e. Session

f. Presentation

g. Physical

Feedback

Your answer is incorrect.

The correct answers are: Physical, Data link

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which two components are added to the PDU at the network access layer? (Choose two.)
Select one or more:

a. frame header 

b. TCP header

c. Trailer 

d. IP header

e. HTTP header

Feedback

Your answer is correct.

The correct answers are: Trailer, frame header

Question 14
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

What is an advantage of using standards to develop and implement protocols?


Select one:

a. A particular protocol can only be implemented by one manufacturer

b. Standard provide flexibility for manufacturers to create devices that comply with unique
requirements

c. Different manufacturers are free to apply different requirements when implementing a


protocol 

d. Products from different manufacturers can interoperate successfully


Feedback

Your answer is incorrect.

The correct answer is: Products from different manufacturers can interoperate successfully

Question 15
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

loop back
AAnswer  address is defined as a reserved address that routes packets back to the
host
Feedback

The correct answer is: loopback

Question 16
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

What type of protocol describes communication over a data link and the physical
transmission of data on the network media?
Select one:

a. Internet protocol

b. Transport protocol 
c. Network access protocol

d. Application protocol

Feedback

Your answer is incorrect.

The correct answer is: Network access protocol

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following are examples of proprietary protocols? (Choose two.)


Select one or more:

a. AppleTalk 

b. Novell NetWare 

c. TCP/IP

d. ISO

Feedback

Your answer is correct.

The correct answers are: AppleTalk, Novell NetWare

Question 18
Incorrect

Mark 0.00 out of 1.00


Flag question

Question text

Which message delivery option is used when all devices need to receive the same message
simultaneously?
Select one:

a. unicast 

b. broadcast

c. duplex

d. multicast

Feedback

Your answer is incorrect.

The correct answer is: broadcast

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following elements do both human and computer communication systems
have in common? (Choose three.)
Select one or more:

a. Keyboard
b. Source 

c. Receiver 

d. Default gateway

e. Channel 

Feedback

Your answer is correct.

The correct answers are: Source, Channel, Receiver

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which organization is responsible for the standard that defines Media Access Control for
wired Ethernet?
Select one:

a. IEEE 

b. IAB

c. ISOC

d. IETF

e. ISO

Feedback

Your answer is correct.


The correct answer is: IEEE

Question 21
Correct

Mark 1.00 out of 1.00

Flag question

Question text

light
In fiber optic meda, the signals are represented as patterns ofAnswer .
Feedback

The correct answer is: light

Question 22
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

What is and advantage of using standards to develop and implement protocols?


Select one:

a. Standards provide flexibility for manufacturers to create devices that comply with unique
requirements

b. Different manufacturers are free to apply different requirements when implementing a


protocol 

c. Products from different manufacturers can interoperate successfully

d. A particular protocol can be implemented by one manufacturer


Feedback

Your answer is incorrect.

The correct answer is: Products from different manufacturers can interoperate successfully

Question 23
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which organization is responsible for developing communications standards for Voice over
IP (VoIP) devices?
Select one:

a. The Electronics Industry Alliance (EIA)

b. The Internet Corporation for Assigned Names and Numbers (ICANN)

c. The Telecommunications Industry Association (TIA) 

d. The International Telecommunications Union-Telecommunications Standardization


Sector (ITU-T)

Feedback

Your answer is correct.

The correct answer is: The Telecommunications Industry Association (TIA)

Question 24
Incorrect

Mark 0.00 out of 1.00


Flag question

Question text

What happens to frames that are too long or too short for the channel used?
Select one:

a. They are returned to the sender.

b. They are delivered but much slower than proper-size frames.

c. They are broken up into smaller pieces.

d. They clog the network and block the delivery of other frames. 

e. They are dropped.

Feedback

Your answer is incorrect.

The correct answer is: They are dropped.

Question 25
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of protocols in data communications?


Select one:

a. specifying the device operating systems that will support the communication
b. specifying the bandwidth of the channel or medium for each type of communication

c. determining the electronic specifications to enable the communication

d. providing the rules required for a specific type of communication to occur 

Feedback

Your answer is correct.

The correct answer is: providing the rules required for a specific type of communication to
occur

Question 26
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

What is the transport layer PDU?


Select one:

a. Segment

b. Data

c. Bit

d. Frame 

e. Packet

Feedback

Your answer is incorrect.

The correct answer is: Segment


Question 27
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What happens when two devices on the same subnet are communicating?
Select one:

a. The data link layer addresses are added to the IP header

b. The sending device will use ARP to determine the IP address of the receiver

c. The frame will be sent to the default gateway for delivery to the receiving device

d. The host portion of the IP addresses will be different 

Feedback

Your answer is correct.

The correct answer is: The host portion of the IP addresses will be different

Question 28
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What command will prevent all unencrypted passwords from displaying in plain text in a
configuration file?
Select one:
a. (config)# enable password secret

b. (config) # enable secret Secret_Password

c. (config) # service password-encryption 

d. (config) # enable secret Encrypted_Password

e. (config-line) # password secret

Feedback

Your answer is correct.

The correct answer is: (config) # service password-encryption

Question 29
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What will a network administrator use to modify a configuration on a Cisco router?


Select one:

a. the Windows command prompt

b. Windows Explorer

c. a DHCP server

d. a control panel

e. IOS 

Feedback
Your answer is correct.

The correct answer is: IOS

Question 30
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which OSI reference model layer is responsible for common representation of the data
transferred between application layer services?
Select one:

a. Network

b. Presentation 

c. Data link

d. Physical

e. Session

f. Transport

g. Application

Feedback

Your answer is correct.

The correct answer is: Presentation

Question 31
Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which two factors influence the method that is used for media access control?
(Choose two.)
Select one or more:

a. how data is generated by end devices applications

b. how the IP protocol forwards the packet to the destination

c. how connection between nodes appears to the data link layer 

d. how nodes share the media 

e. how signals are encoded by the NICs on end devices

Feedback

Your answer is correct.

The correct answers are: how connection between nodes appears to the data link layer, how
nodes share the media

Question 32
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two statements are true of the deterministic access method?(Choose two.)
Select one or more:
a. Each device has to transmit before passing the token to the next device

b. It is a very efficient method because there are no collisions

c. The throughput is predictable 

d. Devices take turns transmitting 

e. The order of transmission is dictated by the node that asks first for the token

Feedback

Your answer is correct.

The correct answers are: The throughput is predictable, Devices take turns transmitting

Question 33
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two message timing mechanisms are used in data communication? (Choose two.)
Select one or more:

a. response timeout 

b. flow control 

c. encoding

d. formatting

e. encapsulation

Feedback
Your answer is correct.

The correct answers are: response timeout, flow control

Question 34
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which two statements are true regarding the user EXEC mode? (Choose two.)
Select one or more:

a. Only some aspects of the router configuration can be viewed

b. Interfaces and routing protocols can be configured

c. This is the default mode on an unconfigured router when first powered up.

d. All router commands are available 

e. Global configuration mode can be accessed by entering the enable command 

Feedback

Your answer is incorrect.

The correct answers are: This is the default mode on an unconfigured router when first
powered up., Only some aspects of the router configuration can be viewed

Question 35
Correct

Mark 1.00 out of 1.00

Flag question
Question text

Which message timing factor impacts how much information can be sent and the speed at
which it can be delivered?
Select one:

a. Flow control 

b. Response timeout  

c. Delay speed

d. Access method

Feedback

Your answer is correct.

The correct answer is: Flow control

Prelim
light
In fiber optic meda, the signals are represented as patterns ofAnswer .
Feedback

The correct answer is: light

Question 2
Correct

Mark 1.00 out of 1.00

Flag question
Question text

Which device performs the function of determining the path that messages should take
through internet works?
Select one:

a. a firewall

b. a web server

c. a router 

d. a DSL modem

Feedback

Your answer is correct.

The correct answer is: a router

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which statement describes a feature of an IOS host name configuration?


Select one:

a. It does not allow spaces 

b. Its maximum length is 255 characters.

c. It must be registered with a DNS server

d. It cannot start with a number

Feedback
Your answer is correct.

The correct answer is: It does not allow spaces

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What happens when two devices on the same subnet are communicating?
Select one:

a. The data link layer addresses are added to the IP header

b. The host portion of the IP addresses will be different 

c. The frame will be sent to the default gateway for delivery to the receiving device

d. The sending device will use ARP to determine the IP address of the receiver

Feedback

Your answer is correct.

The correct answer is: The host portion of the IP addresses will be different

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which PDU is processed when a host computer is de-encapsulating a message at
the transport layer of the TCP/IP model?
Select one:

a. packet

b. segment

c. bits

d. frame

Feedback

Your answer is correct.

The correct answer is: segment

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of the physical link control field in a data link layer header?
Select one:

a. to start and stop traffic over the media

b. to indicate congestion in the media

c. to establish a logical connection between nodes


d. to establish the media link 

Feedback

Your answer is correct.

The correct answer is: to establish the media link

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What command will prevent all unencrypted passwords from displaying in plain text in a
configuration file?
Select one:

a. (config) # service password-encryption 

b. (config) # enable secret Encrypted_Password

c. (config) # enable secret Secret_Password

d. (config-line) # password secret

e. (config)# enable password secret

Feedback

Your answer is correct.

The correct answer is: (config) # service password-encryption

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

loopback
AAnswer  address is defined as a reserved address that routes packets back to the
host
Feedback

The correct answer is: loopback

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two statements are true of the deterministic access method?(Choose two.)
Select one or more:

a. Devices take turns transmitting 

b. Each device has to transmit before passing the token to the next device

c. It is a very efficient method because there are no collisions

d. The throughput is predictable 

e. The order of transmission is dictated by the node that asks first for the token

Feedback
Your answer is correct.

The correct answers are: The throughput is predictable, Devices take turns transmitting

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text

To save time, IOS commands may be partially entered and then completed by typing which
key or key combination?
Select one:

a. Ctrl-P

b. Ctrl-N

c. Down Arrow

d. Right Arrow

e. Up Arrow

f. Tab 

Feedback

Your answer is correct.

The correct answer is: Tab

Question 11
Correct

Mark 1.00 out of 1.00


Flag question

Question text

A company is contemplating whether to use a client/server or a peer-to-peer network. What


are three characteristics of a peer-to-peer network? (Choose three.)
Select one or more:

a. lacks centralized administration 

b. better device performance when acting as both client and server

c.

easy to create 

d. less cost to implement 

e.
better security

f. scalable

Feedback

Your answer is correct.

The correct answers are:

easy to create, lacks centralized administration, less cost to implement

Question 12
Correct

Mark 1.00 out of 1.00


Flag question

Question text

What method can be used by two computers to ensure that packets are not dropped
because too much data is being sent too quickly?
Select one:

a. response timeout

b. encapsulation

c. flow control 

d. access method

Feedback

Your answer is correct.

The correct answer is: flow control

Question 13
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which command or key combination allows a user to return to the previous level in the
command hierarchy?
Select one:
a. exit

b. end

c. Ctrl-Z

d. Ctrl-C

Feedback

Your answer is incorrect.

The correct answer is: exit

Question 14
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which statement describes a characteristic of the frame header fields of the data link layer?
Select one:

a. They vary depending on protocols

b. They all include the flow control and logical connection fields 

c. They include information on user applications

d. Ethernet frame header fields contain Layer 3 source and destination addresses

Feedback
Your answer is incorrect.

The correct answer is: They vary depending on protocols

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What will a network administrator use to modify a configuration on a Cisco router?


Select one:

a. Windows Explorer

b.

the Windows command prompt

c. a DHCP server

d. IOS 

e. a control panel

Feedback

Your answer is correct.

The correct answer is: IOS

Question 16
Correct

Mark 1.00 out of 1.00


Flag question

Question text

For which three reasons was a packet switched connectionless data communications
technology used when developing the Internet (Choose three.)
Select one or more:

a. Network devices dynamically decide on the best available path to forward each packet. 

b. Data packets can travel through the network using multiple different paths 

c. it can rapidly adapt to the failure of network devices and communication links 

d. It requires that a data circuit between the source and destination be established before
data can be transferred.

e. it allows for billing of network use by the amount of time a connection is established

Feedback

Your answer is correct.

The correct answers are: it can rapidly adapt to the failure of network devices and
communication links, Data packets can travel through the network using multiple different
paths, Network devices dynamically decide on the best available path to forward each
packet.

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which two Internet connection options do not require that physical cables be run to the
building? (Choose two.)
Select one or more:

a. cellular

b. satellite

c. dialup

d. dedicated leased line

e. DSL

Feedback

Your answer is correct.

The correct answers are: cellular

, satellite

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two statements are true regarding the user EXEC mode? (Choose two.)
Select one or more:

a. All router commands are available


b. This is the default mode on an unconfigured router when first powered up. 

c. Only some aspects of the router configuration can be viewed 

d. Interfaces and routing protocols can be configured

e. Global configuration mode can be accessed by entering the enable command

Feedback

Your answer is correct.

The correct answers are: This is the default mode on an unconfigured router when first
powered up., Only some aspects of the router configuration can be viewed

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two statements describe intermediary devices? (Choose two.)


Select one or more:

a. Intermediary devices connect individual hosts to the network. 

b. Intermediary devices generate data content.

c. Intermediary devices alter data content.

d. Intermediary devices initiate the encapsulation process.

e. Intermediary devices direct the path of the data. 

Feedback

Your answer is correct.


The correct answers are: Intermediary devices direct the path of the data., Intermediary
devices connect individual hosts to the network.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A data center has recently updated a physical server to host multiple operating systems on
a single CPU. The data center can now provide each customer with a separate web server
without having to allocate an actual discrete server for each customer. What is the network
trend that is being implemented by the data center in this situation?

Select one:

a. online collaboration

b. virtualization 

c. BYOD

d. maintaining communication integrity

Feedback

Your answer is correct.

The correct answer is: virtualization

Question 21
Correct

Mark 1.00 out of 1.00

Flag question
Question text

A network administrator needs to keep the user ID, password, and session contents private
when establishing remote CLI connectivity with a switch to manage it. Which access method
should be chosen?
Select one:

a. Telnet

b. AUX

c. Console

d. SSH

Feedback

Your answer is correct.

The correct answer is: SSH

Question 22
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two connection options provide an always-on, high-bandwidth Internet connection


to computers in a home office? (Choose two.)
Select one or more:

a. cable 
b. dial-up telephone

c. DSL 

d. cellular

e.

satellite

Feedback

Your answer is correct.

The correct answers are: DSL, cable

Question 23
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two factors influence the method that is used for media access control? (Choose
two.)
Select one or more:

a. how nodes share the media 

b. how the IP protocol forwards the packet to the destination

c. how signals are encoded by the NICs on end devices

d. how data is generated by end devices applications

e. how connection between nodes appears to the data link layer 


Feedback

Your answer is correct.

The correct answers are: how connection between nodes appears to the data link layer, how
nodes share the media

Question 24
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Scalable
AAnswer  network is able to expand to accept new devices and applications without
affecting performance.
Feedback

The correct answer is: Scalable

Question 25
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A router has a valid operating system and a configuration file stored in NVRAM. The
configuration file contains an enable secret password but no console password. When the
router boots up, which mode will display?
Select one:

a. global configuration mode


b. privileged EXEC mode

c. setup mode

d. user EXEC mode 

Feedback

Your answer is correct.

The correct answer is: user EXEC mode

Question 26
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A web client is sending a request for a webpage to a web server. From the perspective of
the client, what is the correct order of the protocol stack that is used to prepare the request
for transmission?
Select one:

a. HTTP, IP, TCP, Ethernet

b. HTTP, TCP, IP, Ethernet 

c. Ethernet, IP, TCP, HTTP

d. Ethernet, TCP, IP, HTTP

Feedback

Your answer is correct.

The correct answer is: HTTP, TCP, IP, Ethernet


Question 27
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What two criteria are used to help select a network medium from various network media?
(Choose two.)
Select one or more:

a. the cost of the end devices utilized in the network

b. the distance the selected medium can successfully carry a signal 

c. the number of intermediary devices installed in the network

d. the environment where the selected medium is to be installed 

e. the types of data that need to be prioritized

Feedback

Your answer is correct.

The correct answers are: the distance the selected medium can successfully carry a signal,
the environment where the selected medium is to be installed

Question 28
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of address is 01-00-5E-0A-00-02?
Select one:

a. an address that reaches one specific host

b. an address that reaches a specific  group of hosts 

c. an address that reaches every host inside a local subnet

d. an address that reaches every host in the network

Feedback

Your answer is correct.

The correct answer is: an address that reaches a specific  group of hosts

Question 29
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which procedure is used to access a Cisco 2960 switch when performing an initial
configuration in a secure environment?
Select one:

a. Use Telnet to remotely access the switch through the network. 

b. Use the AUX port to locally access the switch from a serial or USB interface of the PC

c. Use the console port to locally access the switch from a serial or USB interface of the PC.

d. Use Secure Shell to remotely access the switch through the network.

Feedback

Your answer is incorrect.


The correct answer is: Use the console port to locally access the switch from a serial or USB
interface of the PC.

Question 30
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Intranet
AnAnswer  is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees of the
organization, or others with authorization.
Feedback

The correct answer is: Intranet

Question 31
Correct

Mark 1.00 out of 1.00

Flag question

Question text

MAC
The EthernetAnswer  sublayer is responsible for communicating directly with the
physical layer.
Feedback

The correct answer is: mac

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a wiki?
Select one:

a. an audio-based medium that is used to deliver information to a wide audience

b. a web page that groups of people can edit and review

c. an online meeting

d. a personal journal that is posted on the internet

Feedback

Your answer is correct.

The correct answer is: a web page that groups of people can edit and review

Question 33
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What type of communication will send a message to all devices on a local area network?
Select one:
a. multicast

b. allcast

c. broadcast 

d. unicast

Feedback

Your answer is correct.

The correct answer is: broadcast

Question 34
Correct

Mark 1.00 out of 1.00

Flag question

Question text

During a routine inspection, a technician discovered that software that was installed on a
computer was secretly collecting data about websites that were visited by users of the
computer. Which type of threat is affecting this computer
Select one:

a. DoS attack

b. spyware 

c. zero – day attack

d. identity theft

Feedback
Your answer is correct.

The correct answer is: spyware

Question 35
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

An administrator measured the transfer of usable data across a 100 Mb/s physical channel
over a given period of time and obtained 60 Mb/s. Which kind of measurement did the
administrator obtain
Select one:

a. throughput

b. digital bandwidth

c. latency

d. goodput 

Feedback

Your answer is incorrect.

The correct answer is: latency

Question 36
Correct

Mark 1.00 out of 1.00

Flag question
Question text

What three functions are defined by network protocols to allow communication between


known source and destination IP addresses? (Choose three.)
Select one or more:

a. connector specifications

b. data encoding 

c. delivery options 

d. message size 

e. media selection

f. end-device installation

Feedback

Your answer is correct.

The correct answers are: data encoding, message size, delivery options

Question 37
Correct

Mark 1.00 out of 1.00

Flag question

Question text

In which scenario would the use of a WISP be recommended?


Select one:

a. any home with multiple wireless devices

b. a farm in a rural area without wired broadband access 


c. an apartment in a building with cable access to the Internet

d. an Internet cafe in a city

Feedback

Your answer is correct.

The correct answer is: a farm in a rural area without wired broadband access

Question 38
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which statement is correct about network protocols?


Select one:

a. They are only required for exchange of messages between devices on remote networks.

b. Network protocols define the type of hardware that is used and how it is mounted in


racks.

c. They define how messages are exchanged between the source and the destination.

d. They all function in the network access layer of TCP/IP.

Feedback

Your answer is correct.

The correct answer is: They define how messages are exchanged between the source and
the destination.
Question 39
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of protocols in data communications?


Select one:

a. specifying the device operating systems that will support the communication

b. providing the rules required for a specific type of communication to occur 

c. determining the electronic specifications to enable the communication

d. specifying the bandwidth of the channel or medium for each type of communication

Feedback

Your answer is correct.

The correct answer is: providing the rules required for a specific type of communication to
occur

Question 40
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What are two benefits of collaboration and video-on-demand applications? (Choose two.)
Select one or more:
a. providing faster, more secure business communications

b. ensuring a more reliable network

c. providing data storage and retrieval to a business

d. providing a richer e-learning environment 

e. providing better social media opportunities 

Feedback

Your answer is correct.

The correct answers are: providing a richer e-learning environment, providing better social
media opportunities

Question 41
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which type of network design combines voice, video, and data on the same communication
channel?
Select one:

a. a converged network 

b. an extranet

c. a storage area network

d. a traditional network

Feedback

Your answer is correct.


The correct answer is: a converged network

Question 42
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Why would a network administrator use the CLI of the Cisco IOS?
Select one:

a. to monitor the number of times a device has been powered on and off

b. to add a password to a Cisco network device 

c. to test the performance on a particular LAN

d. to provide automatic (unmanned) management of Cisco network devices

Feedback

Your answer is correct.

The correct answer is: to add a password to a Cisco network device

Question 43
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What type of delivery uses data link layer addresses?


Select one:

a. remote delivery

b. local delivery 

c. local and remote delivery

d. remote delivery using routers

Feedback

Your answer is correct.

The correct answer is: local delivery

Question 44
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the function of the kernel of an operating software?


Select one:

a. The kernel links the hardware drivers with the underlying electronics of a computer.

b. It is an application that allows the initial configuration of a Cisco device.

c. The kernel provisions hardware resources to meet software requirements.

d. It provides a user interface that allows users to request a specific task.

Feedback
Your answer is correct.

The correct answer is: The kernel provisions hardware resources to meet software
requirements.

Question 45
Correct

Mark 1.00 out of 1.00

Flag question

Question text

When is a wired connection preffered to a wireless connection by an end-user device?


Select one:

a. when the end-user device is within range of a wireless signal

b. when the end-user device will run an application that requires a dedicated connection to
the network 

c. when the end-user device will run an application that is delay tolerant

d. when the end-user device only has a WLAN NIC

Feedback

Your answer is correct.

The correct answer is: when the end-user device will run an application that requires a
dedicated connection to the network

Question 46
Incorrect

Mark 0.00 out of 1.00


Flag question

Question text

What is a characteristic of a contention-based access method?


Select one:

a. It has has mechanisms to the turns devices take to access the media

b. It processes more overhead than the controlled access methods do 

c. It scales very well under heavy media use

d. It is as nondeterministic method

Feedback

Your answer is incorrect.

The correct answer is: It is as nondeterministic method

Question 47
Correct

Mark 1.00 out of 1.00

Flag question

Question text

An administrator has just changed the IP address of an interface on an IOS device. What
else must be done in order to apply those changes to the device?
Select one:

a. Copy the information in the startup configuration file to the running configuration
b. Nothing must be done. Changes to the configuration on an IOS device take effect as
soon as the command is typed correctly and the Enter key has been pressed. 

c. Reload the device and type yes when prompted to save the configuration

d. Copy the running configuration to the startup configuration file.

Feedback

Your answer is correct.

The correct answer is: Nothing must be done. Changes to the configuration on an IOS
device take effect as soon as the command is typed correctly and the Enter key has been
pressed.

Question 48
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is encrypted with the enable secret command?


Select one:

a. all configured passwords

b. the VTY line password

c. the consoled line password

d. the privileged executive mode password 

Feedback

Your answer is correct.

The correct answer is: the privileged executive mode password


Question 49
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which term describes the state of a network when the demand on the network resources
exceeds the available capacity?
Select one:

a. synchronization

b. congestion 

c. optimization

d. convergence

Feedback

Your answer is correct.

The correct answer is: congestion

Question 50
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which logical address is used for delivery of data to a remote network?


Select one:

a. source IP address

b. destination IP address 

c. source MAC address

d. destination MAC address

e. destination IP address

Feedback

Your answer is incorrect.

The correct answer is: destination IP address

Question 51
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two components are added to the PDU at the network access layer? (Choose two.)
Select one or more:

a. Trailer 

b. IP header

c. frame header 

d. HTTP header

e. TCP header

Feedback
Your answer is correct.

The correct answers are: Trailer, frame header

Question 52
Correct

Mark 1.00 out of 1.00

Flag question

Question text

The farther you are from the central office when utilizing a DSL connection, theAnswer
slow er

 the connection speed


Feedback

The correct answer is: slower

Question 53
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A technician configures a switch with these commands:


SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:
a. password encryption

b. Telnet access

c. SVI 

d. physical switchport access

Feedback

Your answer is correct.

The correct answer is: SVI

Question 54
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which is a function of the Logical Link Control (LLC) sublayer?


Select one:

a. to identify which network layer protocol is being used 

b. to accept segments and package them into data units that are called packets

c. to define the media access processes that are performed by the hardware

d. to provide data link layer addressing

Feedback

Your answer is correct.

The correct answer is: to identify which network layer protocol is being used

Question 55
Correct
Mark 1.00 out of 1.00

Flag question

Question text

An employee at a branch office is creating a quote for a customer. In order to do this, the
employee needs to access confidential pricing information from internal servers at the Head
Office. What type of network would the employee access?
Select one:

a. the Internet

b. an intranet 

c. an extranet

d. a local area network

Feedback

Your answer is correct.

The correct answer is: an intranet

Question 56
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What process is used to place one message inside another message for transfer from the
source to the destination?
Select one:
a. encapsulation 

b. flow control

c. access control

d. decoding

Feedback

Your answer is correct.

The correct answer is: encapsulation

Question 57
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which area of the network would a college IT staff most likely have to redesign as a direct
result of many students bringing their own tablets and smartphones to school to access
school resources?
Select one:

a. intranet

b. wireless WAN

c. extranet 

d. wireless LAN

e. wired LAN
Feedback

Your answer is incorrect.

The correct answer is: wireless LAN

Question 58
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What are two functions of end devices on a network? (Choose two.)


Select one or more:

a. They are the interface between humans and the communication network. 

b. They direct data over alternate paths in the event of link failures.

c. They provide the channel over which the network message travels.

d. They originate the data that flows through the network. 

e. They filter the flow of data to enhance security

Feedback

Your answer is correct.

The correct answers are: They originate the data that flows through the network., They are
the interface between humans and the communication network.

Question 59
Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which interface command must be entered in a Layer 3 switch before IPv4 address can be
assigned to the interface?
Select one:

a. switchport

b. noshutdown

c. no switchport 

d. ip classless

Feedback

Your answer is correct.

The correct answer is: no switchport

Question 60
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is a characteristic of a WAN hub-and-spoke topology?


Select one:

a. All sites require a hub device that connects to a router


b. it requires that every site be interconnected to each other through point to-point links

c. It requires that some of the branch sites be interconnected through point-to-point links

d. The branch sites are connected to a central site through point-point links 

Feedback

Your answer is correct.

The correct answer is: The branch sites are connected to a central site through point-point
links

Question 61
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which device acts as gateway to allow hosts to send traffic to remote IP networks?
Select one:

a. DHCP server

b. DNS server

c. local switch 

d. local router

Feedback

Your answer is incorrect.

The correct answer is: local router

Question 62
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Which two engineering organizations define open standards and protocols that apply to the
data link layer?
Select one:

a. Internet Society (ISOC)

b. International Telecommunication Union (ITU)

c. Internet Assigned Numbers Authority (IANA)

d. Electronic Industries Alliance (EIA

e. International Organization for Standardization (ISO) 

Feedback

Your answer is incorrect.

The correct answer is: International Telecommunication Union (ITU)

Question 63
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Why would a technician enter the command copy startup-config running config?
Select one:
a. to copy an existing configuration into RAM 

b. to make a changed configuration the new startup configuration

c. to save an active configuration to NVRAM

d. to remove all configuration from the switch

Feedback

Your answer is correct.

The correct answer is: to copy an existing configuration into RAM

Question 64
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which statement is correct about network protocols?


Select one:

a. They are only required for exchange of message between devices on remote network

b. They define how messages are exchanged between the sources and the destination 

c. They all function in the network access layer of TCP/IP

d. Network protocols define the type of hardware that is used and how it is mounted in


racks

Feedback

Your answer is correct.

The correct answer is: They define how messages are exchanged between the sources and
the destination
Question 65
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A network administer has forgotten the argument of an IOS command. How would the
administrator get help from the IOS CLI to complete the command correctly?
Select one:

a. Type help and press the Enter key at the prompt

b. Type the command and then press the? key 

c. Type the command and then press CTRL-C

d. Type the command, type help, and press the Enter key.

e. Type the command and then press the Tab key

Feedback

Your answer is correct.

The correct answer is: Type the command and then press the? key

Question 66
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is an advantage of using standards to develop and implement protocols?
Select one:

a. Standard provide flexibility for manufacturers to create devices that comply with unique
requirements

b. Different manufacturers are free to apply different requirements when implementing a


protocol

c. A particular protocol can only be implemented by one manufacturer

d. Products from different manufacturers can interoperate successfully 

Feedback

Your answer is correct.

The correct answer is: Products from different manufacturers can interoperate successfully

Question 67
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which organization develops the 802 family of standard for wired and wireless LANs and
MANs?
Select one:

a. IEEE 

b. ITU-T

c. ISO
d. IANA

e. ISOC

Feedback

Your answer is correct.

The correct answer is: IEEE

Question 68
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which message delivery option is used when all devices need to receive the same message
simultaneously?
Select one:

a. broadcast 

b. unicast

c. multicast

d. duplex

Feedback

Your answer is correct.

The correct answer is: broadcast

Question 69
Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which two message timing mechanisms are used in data communication? (Choose two.)
Select one or more:

a. encapsulation

b. response timeout 

c. flow control 

d. formatting

e. encoding

Feedback

Your answer is correct.

The correct answers are: response timeout, flow control

Question 70
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which statement describes a network that supports QoS?


Select one:

a. The network provides predictable levels of service to different types of traffic 


b. The fewest possible devices are affected by a failure

c. Data sent over the network is not altered in transmission

d. The network should be able to expand to keep up with user demand

Feedback

Your answer is correct.

The correct answer is: The network provides predictable levels of service to different types of
traffic

You might also like