SlideShare a Scribd company logo
1 of 30
Cisco 1 - Networking Basics                                   Chapter 11




    At which layer of the TCP/IP model does Telnet operate?

             1.   application
             2.   presentation
             3.   session
             4.   transport
             5.   internet
             6.   network access




Perrine. J                            07/15/09                        Page 1
Cisco 1 - Networking Basics                                   Chapter 11




    At which layer of the TCP/IP model does Telnet operate?

             •   application
             •   presentation
             •   session
             •   transport
             •   internet
             •   network access




Perrine. J                            07/15/09                        Page 2
Cisco 1 - Networking Basics                                    Chapter 11




      Which of the following SNMP components would a router be considered?

             1.   network management system
             2.   agents
             3.   managed devices
             4.   secure ports




Perrine. J                             07/15/09                         Page 3
Cisco 1 - Networking Basics                                    Chapter 11




      Which of the following SNMP components would a router be considered?

             •   network management system
             •   agents
             •   managed devices
             •   secure ports




Perrine. J                            07/15/09                          Page 4
Cisco 1 - Networking Basics                                   Chapter 11




   Which SNMP component is responsible for using the majority of memory
   resources?

             1.   network management system
             2.   agents
             3.   managed devices
             4.   secure ports




Perrine. J                               07/15/09                         Page 5
Cisco 1 - Networking Basics                                   Chapter 11




   Which SNMP component is responsible for using the majority of memory
   resources?

             •   network management system
             •   agents
             •   managed devices
             •   secure ports




Perrine. J                            07/15/09                            Page 6
Cisco 1 - Networking Basics                                      Chapter 11




     Which protocol is used by e-mail servers to communicate with each other?

             1.   FTP
             2.   HTTP
             3.   TFTP
             4.   SMTP
             5.   POP
             6.   SNMP




Perrine. J                             07/15/09                           Page 7
Cisco 1 - Networking Basics                                      Chapter 11




     Which protocol is used by e-mail servers to communicate with each other?

             •   FTP
             •   HTTP
             •   TFTP
             •   SMTP
             •   POP
             •   SNMP




Perrine. J                             07/15/09                           Page 8
Cisco 1 - Networking Basics                                      Chapter 11




     Which part of the URL http://www.awsb.ca/teacher gives the name of the
     domain?

             1.   www
             2.   http://
             3.   /teacher
             4.   awsb.ca




Perrine. J                             07/15/09                           Page 9
Cisco 1 - Networking Basics                                      Chapter 11




     Which part of the URL http://www.awsb.ca/teacher gives the name of the
     domain?

             •   www
             •   http://
             •   /teacher
             •   awsb.ca




Perrine. J                             07/15/09                           Page 10
Cisco 1 - Networking Basics                                     Chapter 11




   Which of the following are disadvantages of using SMTP for e-mail servers?
   (Choose two.)

             1.   offers very little security
             2.   no authentication
             3.   strong reliability
             4.   does not work well with email servers




Perrine. J                                      07/15/09                  Page 11
Cisco 1 - Networking Basics                                     Chapter 11




   Which of the following are disadvantages of using SMTP for e-mail servers?
   (Choose two.)

             •   offers very little security
             •   no authentication
             •   strong reliability
             •   does not work well with email servers




Perrine. J                                     07/15/09                   Page 12
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following are components of SNMP? (Choose three.)

             1.   network management system
             2.   protocol analyzer
             3.   managed devices
             4.   secure ports
             5.   agents
             6.   protocol inspector




Perrine. J                              07/15/09                       Page 13
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following are components of SNMP? (Choose three.)

             •   network management system
             •   protocol analyzer
             •   managed devices
             •   secure ports
             •   agents
             •   protocol inspector




Perrine. J                            07/15/09                         Page 14
Cisco 1 - Networking Basics                                          Chapter 11




     Which of the following uses a connectionless protocol to transfer files?

             1.   FTP
             2.   TFTP
             3.   HTTP
             4.   SNMP




Perrine. J                               07/15/09                               Page 15
Cisco 1 - Networking Basics                                          Chapter 11




     Which of the following uses a connectionless protocol to transfer files?

             •   FTP
             •   TFTP
             •   HTTP
             •   SNMP




Perrine. J                               07/15/09                               Page 16
Cisco 1 - Networking Basics                                         Chapter 11




     Which type of institution does the domain suffix .org represent?

             1.   government
             2.   education
             3.   network
             4.   non-profit




Perrine. J                               07/15/09                           Page 17
Cisco 1 - Networking Basics                                         Chapter 11




     Which type of institution does the domain suffix .org represent?

             •   government
             •   education
             •   network
             •   non-profit




Perrine. J                               07/15/09                           Page 18
Cisco 1 - Networking Basics                                          Chapter 11




      Which protocol is used by FTP to transfer files over the Internet?

             1.   TCP
             2.   SMTP
             3.   UDP
             4.   SNMP




Perrine. J                               07/15/09                            Page 19
Cisco 1 - Networking Basics                                          Chapter 11




      Which protocol is used by FTP to transfer files over the Internet?

             •   TCP
             •   SMTP
             •   UDP
             •   SNMP




Perrine. J                               07/15/09                            Page 20
Cisco 1 - Networking Basics                                  Chapter 11




     Which TCP/IP layer is responsible for dialog control?

             1.   application
             2.   presentation
             3.   session
             4.   transport




Perrine. J                              07/15/09                     Page 21
Cisco 1 - Networking Basics                                  Chapter 11




     Which TCP/IP layer is responsible for dialog control?

             •   application
             •   presentation
             •   session
             •   transport




Perrine. J                              07/15/09                     Page 22
Cisco 1 - Networking Basics                                       Chapter 11




   What does TCP use to begin the three-way handshaking process?

             1.   The destination host sends an ACK segment.
             2.   The sending host sends a SYN segment.
             3.   The sending host sends a SYN and ACK segment.
             4.   The destination host sends a SYN segment.




Perrine. J                                 07/15/09                       Page 23
Cisco 1 - Networking Basics                                      Chapter 11




   What does TCP use to begin the three-way handshaking process?

             •   The destination host sends an ACK segment.
             •   The sending host sends a SYN segment.
             •   The sending host sends a SYN and ACK segment.
             •   The destination host sends a SYN segment.




Perrine. J                                07/15/09                       Page 24
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following protocols use TCP? (Choose two.)

             1.   FTP
             2.   DHCP
             3.   TFTP
             4.   HTTP
             5.   SYN




Perrine. J                             07/15/09                        Page 25
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following protocols use TCP? (Choose two.)

             •   FTP
             •   DHCP
             •   TFTP
             •   HTTP
             •   SYN




Perrine. J                             07/15/09                        Page 26
Cisco 1 - Networking Basics                                        Chapter 11




     Which of the following is true when the TCP window size is 3 and data
     transmission has just begun?

             1.   The source must receive an "ACK 3" acknowledgement before
                  sending more data.
             2.   The destination must receive an "ACK 3" acknowledgement before
                  accepting more data.
             3.   The source must receive an "ACK 4" acknowledgement before
                  sending more data.
             4.   The destination must receive an "ACK 4" acknowledgement before
                  accepting more data.




Perrine. J                                07/15/09                           Page 27
Cisco 1 - Networking Basics                                       Chapter 11




     Which of the following is true when the TCP window size is 3 and data
     transmission has just begun?

             •   The source must receive an "ACK 3" acknowledgement before
                 sending more data.
             •   The destination must receive an "ACK 3" acknowledgement before
                 accepting more data.
             •   The source must receive an "ACK 4" acknowledgement before
                 sending more data.
             •   The destination must receive an "ACK 4" acknowledgement before
                 accepting more data.




Perrine. J                               07/15/09                            Page 28
Cisco 1 - Networking Basics                                      Chapter 11




   Which protocol can be used to load or retrieve Cisco IOS images to or from a
   router?

             1.   SNMP
             2.   TFTP
             3.   UDP
             4.   TCP




Perrine. J                            07/15/09                            Page 29
Cisco 1 - Networking Basics                                      Chapter 11




   Which protocol can be used to load or retrieve Cisco IOS images to or from a
   router?

             •   SNMP
             •   TFTP
             •   UDP
             •   TCP




Perrine. J                            07/15/09                            Page 30

More Related Content

Viewers also liked

CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services QuestionsDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 

Viewers also liked (6)

CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 

Similar to Cisco Networking Chapter Quiz

Q1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet SwitchingQ1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet Switchingjerometnewman
 
Q1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And SubnetsQ1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And Subnetsjerometnewman
 
Q1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa NsQ1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa Nsjerometnewman
 
Q1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking FundamentalsQ1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking Fundamentalsjerometnewman
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI modelsJake Weaver
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015ICT PRISTINE
 
Hacking Robotics(English Version)
Hacking Robotics(English Version)Hacking Robotics(English Version)
Hacking Robotics(English Version)Kensei Demura
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephonyKundan Singh
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmpPalanivel Kuppusamy
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabusVinay Kumar C
 
Q1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To NetworkingQ1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To Networkingjerometnewman
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2Anne Starr
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gvvgy_a
 

Similar to Cisco Networking Chapter Quiz (20)

Q1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet SwitchingQ1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet Switching
 
Q1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And SubnetsQ1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And Subnets
 
Q1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa NsQ1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa Ns
 
Q1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking FundamentalsQ1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking Fundamentals
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015
 
Silc
SilcSilc
Silc
 
Hacking Robotics(English Version)
Hacking Robotics(English Version)Hacking Robotics(English Version)
Hacking Robotics(English Version)
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephony
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmp
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabus
 
Computer networks
Computer networksComputer networks
Computer networks
 
Q1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To NetworkingQ1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To Networking
 
SNMP
SNMPSNMP
SNMP
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
OSI Model
OSI ModelOSI Model
OSI Model
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Cisco Networking Chapter Quiz

  • 1. Cisco 1 - Networking Basics Chapter 11 At which layer of the TCP/IP model does Telnet operate? 1. application 2. presentation 3. session 4. transport 5. internet 6. network access Perrine. J 07/15/09 Page 1
  • 2. Cisco 1 - Networking Basics Chapter 11 At which layer of the TCP/IP model does Telnet operate? • application • presentation • session • transport • internet • network access Perrine. J 07/15/09 Page 2
  • 3. Cisco 1 - Networking Basics Chapter 11 Which of the following SNMP components would a router be considered? 1. network management system 2. agents 3. managed devices 4. secure ports Perrine. J 07/15/09 Page 3
  • 4. Cisco 1 - Networking Basics Chapter 11 Which of the following SNMP components would a router be considered? • network management system • agents • managed devices • secure ports Perrine. J 07/15/09 Page 4
  • 5. Cisco 1 - Networking Basics Chapter 11 Which SNMP component is responsible for using the majority of memory resources? 1. network management system 2. agents 3. managed devices 4. secure ports Perrine. J 07/15/09 Page 5
  • 6. Cisco 1 - Networking Basics Chapter 11 Which SNMP component is responsible for using the majority of memory resources? • network management system • agents • managed devices • secure ports Perrine. J 07/15/09 Page 6
  • 7. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by e-mail servers to communicate with each other? 1. FTP 2. HTTP 3. TFTP 4. SMTP 5. POP 6. SNMP Perrine. J 07/15/09 Page 7
  • 8. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by e-mail servers to communicate with each other? • FTP • HTTP • TFTP • SMTP • POP • SNMP Perrine. J 07/15/09 Page 8
  • 9. Cisco 1 - Networking Basics Chapter 11 Which part of the URL http://www.awsb.ca/teacher gives the name of the domain? 1. www 2. http:// 3. /teacher 4. awsb.ca Perrine. J 07/15/09 Page 9
  • 10. Cisco 1 - Networking Basics Chapter 11 Which part of the URL http://www.awsb.ca/teacher gives the name of the domain? • www • http:// • /teacher • awsb.ca Perrine. J 07/15/09 Page 10
  • 11. Cisco 1 - Networking Basics Chapter 11 Which of the following are disadvantages of using SMTP for e-mail servers? (Choose two.) 1. offers very little security 2. no authentication 3. strong reliability 4. does not work well with email servers Perrine. J 07/15/09 Page 11
  • 12. Cisco 1 - Networking Basics Chapter 11 Which of the following are disadvantages of using SMTP for e-mail servers? (Choose two.) • offers very little security • no authentication • strong reliability • does not work well with email servers Perrine. J 07/15/09 Page 12
  • 13. Cisco 1 - Networking Basics Chapter 11 Which of the following are components of SNMP? (Choose three.) 1. network management system 2. protocol analyzer 3. managed devices 4. secure ports 5. agents 6. protocol inspector Perrine. J 07/15/09 Page 13
  • 14. Cisco 1 - Networking Basics Chapter 11 Which of the following are components of SNMP? (Choose three.) • network management system • protocol analyzer • managed devices • secure ports • agents • protocol inspector Perrine. J 07/15/09 Page 14
  • 15. Cisco 1 - Networking Basics Chapter 11 Which of the following uses a connectionless protocol to transfer files? 1. FTP 2. TFTP 3. HTTP 4. SNMP Perrine. J 07/15/09 Page 15
  • 16. Cisco 1 - Networking Basics Chapter 11 Which of the following uses a connectionless protocol to transfer files? • FTP • TFTP • HTTP • SNMP Perrine. J 07/15/09 Page 16
  • 17. Cisco 1 - Networking Basics Chapter 11 Which type of institution does the domain suffix .org represent? 1. government 2. education 3. network 4. non-profit Perrine. J 07/15/09 Page 17
  • 18. Cisco 1 - Networking Basics Chapter 11 Which type of institution does the domain suffix .org represent? • government • education • network • non-profit Perrine. J 07/15/09 Page 18
  • 19. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by FTP to transfer files over the Internet? 1. TCP 2. SMTP 3. UDP 4. SNMP Perrine. J 07/15/09 Page 19
  • 20. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by FTP to transfer files over the Internet? • TCP • SMTP • UDP • SNMP Perrine. J 07/15/09 Page 20
  • 21. Cisco 1 - Networking Basics Chapter 11 Which TCP/IP layer is responsible for dialog control? 1. application 2. presentation 3. session 4. transport Perrine. J 07/15/09 Page 21
  • 22. Cisco 1 - Networking Basics Chapter 11 Which TCP/IP layer is responsible for dialog control? • application • presentation • session • transport Perrine. J 07/15/09 Page 22
  • 23. Cisco 1 - Networking Basics Chapter 11 What does TCP use to begin the three-way handshaking process? 1. The destination host sends an ACK segment. 2. The sending host sends a SYN segment. 3. The sending host sends a SYN and ACK segment. 4. The destination host sends a SYN segment. Perrine. J 07/15/09 Page 23
  • 24. Cisco 1 - Networking Basics Chapter 11 What does TCP use to begin the three-way handshaking process? • The destination host sends an ACK segment. • The sending host sends a SYN segment. • The sending host sends a SYN and ACK segment. • The destination host sends a SYN segment. Perrine. J 07/15/09 Page 24
  • 25. Cisco 1 - Networking Basics Chapter 11 Which of the following protocols use TCP? (Choose two.) 1. FTP 2. DHCP 3. TFTP 4. HTTP 5. SYN Perrine. J 07/15/09 Page 25
  • 26. Cisco 1 - Networking Basics Chapter 11 Which of the following protocols use TCP? (Choose two.) • FTP • DHCP • TFTP • HTTP • SYN Perrine. J 07/15/09 Page 26
  • 27. Cisco 1 - Networking Basics Chapter 11 Which of the following is true when the TCP window size is 3 and data transmission has just begun? 1. The source must receive an "ACK 3" acknowledgement before sending more data. 2. The destination must receive an "ACK 3" acknowledgement before accepting more data. 3. The source must receive an "ACK 4" acknowledgement before sending more data. 4. The destination must receive an "ACK 4" acknowledgement before accepting more data. Perrine. J 07/15/09 Page 27
  • 28. Cisco 1 - Networking Basics Chapter 11 Which of the following is true when the TCP window size is 3 and data transmission has just begun? • The source must receive an "ACK 3" acknowledgement before sending more data. • The destination must receive an "ACK 3" acknowledgement before accepting more data. • The source must receive an "ACK 4" acknowledgement before sending more data. • The destination must receive an "ACK 4" acknowledgement before accepting more data. Perrine. J 07/15/09 Page 28
  • 29. Cisco 1 - Networking Basics Chapter 11 Which protocol can be used to load or retrieve Cisco IOS images to or from a router? 1. SNMP 2. TFTP 3. UDP 4. TCP Perrine. J 07/15/09 Page 29
  • 30. Cisco 1 - Networking Basics Chapter 11 Which protocol can be used to load or retrieve Cisco IOS images to or from a router? • SNMP • TFTP • UDP • TCP Perrine. J 07/15/09 Page 30