0% found this document useful (0 votes)
12 views

Networking Practice Modules Solutions Numbered

Uploaded by

zyadshaban2008
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Networking Practice Modules Solutions Numbered

Uploaded by

zyadshaban2008
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Networking Practice Modules - Solutions

Practice Module 1

True/False Questions
1. T/F: A Local Area Network (LAN) typically spans a large geographical area and connects
multiple remote locations.
Answer: False

2. T/F: Bring Your Own Device (BYOD) allows employees to use personal devices such as
laptops and smartphones to connect to a corporate network.
Answer: True

3. T/F: Peer-to-peer networks are typically used in small networks for simple tasks like
sharing files and printers.
Answer: True

4. T/F: Ethernet WAN extends the LAN access technology into a wide area network
infrastructure.
Answer: True

Multiple Choice Questions


1. Which of the following is a characteristic of a reliable network?
a) Fault Tolerance
b) Scalability
c) Quality of Service (QoS)
d) All of the above

2. What type of network connects devices over a small geographic area, such as a
home or office?
a) WAN
b) LAN
c) Intranet
d) Extranet

3. Which of the following is not an external security threat to a network?


a) Trojan horse
b) Zero-day attack
c) Accidental misuse by employees
d) Denial of service attack
4. What is the main purpose of the Cisco Certified Network Associate (CCNA)
certification?
a) To demonstrate knowledge of foundational networking technologies
b) To validate advanced programming skills
c) To specialize in ethical hacking techniques
d) To provide cloud computing certification

5. Which media type uses electrical impulses to transmit data across a network?
a) Fiber-optic cables
b) Wireless transmission
c) Metal wires
d) Satellite connections

6. Which of the following technologies is not typically used to connect home users to
the internet?
a) DSL
b) Leased lines
c) Cellular networks
d) Cable

Short Answer Questions


1. What are the two primary types of network infrastructures?
Answer: LAN (Local Area Network) and WAN (Wide Area Network)

2. How do converged networks benefit organizations?


Answer: They allow multiple types of traffic (voice, video, data) over a single network
infrastructure, reducing costs and complexity.

3. What are the four characteristics of a reliable network architecture?


Answer: Fault Tolerance, Scalability, Quality of Service, and Security.

4. What is the purpose of an intranet within an organization?


Answer: To provide internal communication and resource sharing within the organization.

5. Name one advantage and one disadvantage of a peer-to-peer network.


Answer: Advantage: Easy setup and low cost. Disadvantage: Limited scalability and security.

Practice Module 2

True/False Questions
1. T/F: The enable secret command is used to secure the user EXEC mode on a Cisco device.
Answer: False
2. T/F: Telnet is a secure method for remote CLI connection to a Cisco device.
Answer: False

3. T/F: IPv4 addresses are represented by four decimal numbers separated by periods,
called dotted decimal notation.
Answer: True

4. T/F: The no shutdown command is used to disable an interface on a switch.


Answer: False

Multiple Choice Questions


1. Which command is used to enter global configuration mode on a Cisco device?
a) enable
b) configure terminal
c) show running-config
d) ping

2. Which method provides a secure remote connection to a Cisco device?


a) Console
b) Telnet
c) Secure Shell (SSH)
d) Auxiliary (AUX)

3. Which of the following is not a valid configuration mode in Cisco IOS?


a) Privileged EXEC mode
b) User EXEC mode
c) Line configuration mode
d) Monitoring mode

4. What is the purpose of the service password-encryption command?


a) To enable password recovery
b) To store passwords in plaintext
c) To encrypt all plaintext passwords in the configuration file
d) To disable password encryption on the device

5. Which of the following commands is used to save the running configuration to the
startup configuration?
a) show running-config
b) copy running-config startup-config
c) write erase
d) reload
6. Which of the following is used to configure IP addressing on a switch’s Virtual
Interface?
a) interface vlan 1
b) ip address dhcp
c) configure terminal
d) ip address static

Short Answer Questions


1. What are the two types of configuration files used in Cisco devices, and where are they
stored?
Answer: Running configuration (in RAM) and startup configuration (in NVRAM).

2. How can you encrypt all plaintext passwords in a Cisco device configuration?
Answer: By using the command 'service password-encryption'.

3. What is the function of the no shutdown command on a switch interface?


Answer: It enables the interface.

4. Explain the difference between Telnet and SSH in terms of security.


Answer: SSH is a secure, encrypted protocol, whereas Telnet transmits data in plaintext.

5. What is the purpose of configuring a default gateway on an end device?


Answer: To enable communication with devices in different networks.

You might also like