SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
EXAMEN CISCO
CCNA 1 Chapter 1 v5 Exam Answers
Time limit: 00:58:37
1. Question
1. Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a
LAN? (Choose two.)
1. cellular
2. DSL
3. satellite
4. cable
5. dial-up telephone
2. Question
2. What type of network must a home user access in order to do online shopping?
1. a local area network
2. the Internet
3. an extranet
4. an intranet
3. Question
3. What are two functions of intermediary devices on a network? (Choose two.)
1. They are the primary source and providers of information and services to end devices.
2. They form the interface between the human network and the underlying communication
network.
3. They direct data along alternate pathways when there is a link failure.
4. They run applications that support collaboration for business.
5. They filter the flow of data, based on security settings.
4. Question
4. Fill in the blank.
1. The acronym refers to the trend of end users being able to use their personal
devices to access the business network and resources.
5. Question
5. Which description correctly defines a converged network?
1. a network that allows users to interact directly with each other over multiple channels
2. a network that is limited to exchanging character-based information
3. a dedicated network with separate channels for video and voice services
4. a single network channel capable of delivering multiple communication forms
6. Question
6. Drag and drop
Match each characteristic to its corresponding internet conectivity type.
Sort elements
1. splits the access line into three signals
2. typically has very low bandwidth
3. Not suited for heavily wooded areas
4. uses coaxial cable as a medium
satellite
dialup telephone
DSL
cable
7. 7. Question
7.
Drag and drop
Match the form of network communication with its description.
Sort elements
1. wiki
2. Social media
3. instant messaging
4. podcast
Web pages that
groups of people can
edit and view
together
Interactive websites
where people created
and share user-
generated content
with friends and
family
real-time
communication of
between two or more
people
an audio-based
medium that allows
people to deliver their
recordings to a wide
audience
8. Question
8. Drag and drop
Match each definition to the corresponding security goal:
Sort elements
1. the assurance that the information has not been altered during transmission
2. the assurance of timely and reliable access to data
3. only the intended recipients can access and read the data
maintaining integrity
ensuring
confidentiality
ensuring availability
9. Question
9. Which statement describes a characteristic of cloud computing?
1. A business can connect directly to the Internet without the use of an ISP.
2. Devices can connect to the Internet through existing electrical wiring.
3. Investment in new infrastructure is required in order to access the cloud.
4. Applications can be accessed over the Internet through a subscription.
10. Question
10. Which two Internet connection options do not require that physical cables be run to the building?
(Choose two.)
1. cellular
2. dialup
3. satellite
4. DSL
5. dedicated leased line
11. Question
11. What is a characteristic of circuit-switched networks?
1. A single message can be broken into multiple message blocks that are transmitted through
multiple circuits simultaneously.
2. If all circuits are busy, a new call cannot be placed.
3. If a circuit fails, the call will be forwarded on a new path.
4. Circuit-switched networks can dynamically learn and use redundant circuits.
12. Question
12. Requiring strong, complex passwords is a practice that supports which network security goal?
1. maintaining communication integrity
2. ensuring redundancy
3. ensuring data confidentiality
4. ensuring reliability of access
13. Question
13. What two criteria are used to help select network media? (Choose two.)
1. the distance the media can successfully carry a signal
2. the environment where the media is to be installed
3. the cost of the end devices utilized in the network
4. the number of intermediary devices installed in the network
5. the types of data that need to be prioritized
14. Question
14. Which statement describes a network that supports QoS?
1. Data sent over the network is not altered in transmission.
2. The fewest possible devices are affected by a failure.
3. The network provides predictable levels of service to different types of traffic.
4. The network should be able to expand to keep up with user demand.
15. Question
Refer to the exhibit. Which set of devices contains only intermediary devices?
1. A, B, E, F
2. A, B, D, G
3. G, H, I, J
4. C, D, G, I
16. Question
16. Which device performs the function of determining the path that messages should take through
internetworks?
1. a web server
2. a DSL modem
3. a router
4. a firewall
17. Question
17. Which tool provides real-time video and audio communication over the Internet so that businesses
can conduct corporate meetings with participants from several remote locations?
1. wiki
2. instant messaging
3. weblog
4. TelePresence
18. Question
18. Which two statements about the relationship between LANs and WANs are true? (Choose two.)
1. Both LANs and WANs connect end devices. .
2. WANs are typically operated through multiple ISPs, but LANs are typically operated by
single organizations or individuals.
3. WANs connect LANs at slower speed bandwidth than LANs connect their internal end
devices.
4. The Internet is a WAN.
5. WANs must be publicly-owned, but LANs can be owned by either public or private entities
19. Question
19. Which three network tools provide the minimum required security protection for home users?
(Choose three.)
1. antivirus software
2. antispyware software
3. an intrusion prevention system
4. powerline networking
5. a firewall
6. access control lists
20. Question
20. Which area of the network would a college IT staff most likely have to redesign as a direct result of
many students bringing their own tablets and smartphones to school to access school resources?
1. intranet
2. wired LAN
3. wireless LAN
4. extranet
5. wireless WAN
21. Question
21. Which expression accurately defines the term congestion?
1. a method of limiting the impact of a hardware or software failure on the network
2. a set of techniques to manage the utilization of network resources
3. a state where the demand on the network resources exceeds the available capacity
4. a measure of the data carrying capacity of the network
22. Question
What two criteria are used to help select a network medium from various network media? (Choose
two.)
1. the types of data that need to be prioritized
2. the cost of the end devices utilized in the network
3. the number of intermediary devices installed in the network
4. the environment where the selected medium is to be installed
5. the distance the selected medium can successfully carry a signal
23. Question
23. Which term describes the state of a network when the demand on the network resources exceeds
the available capacity?
1. optimization
2. congestion
3. convergence
4. synchronization

Weitere ähnliche Inhalte

Was ist angesagt?

A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area network
IAEME Publication
 

Was ist angesagt? (7)

Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms Internet
 
Paper id 71201996
Paper id 71201996Paper id 71201996
Paper id 71201996
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
 
Synopsis
SynopsisSynopsis
Synopsis
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area network
 

Andere mochten auch

Examen veronica
Examen veronicaExamen veronica
Examen veronica
verito161
 
Cuentas por pagar a corto plazo cap. 17 eqpo. 7
Cuentas por pagar a corto plazo cap. 17 eqpo. 7Cuentas por pagar a corto plazo cap. 17 eqpo. 7
Cuentas por pagar a corto plazo cap. 17 eqpo. 7
Alfredo Hernandez
 

Andere mochten auch (13)

Bus 475 guide 1 44) Use the following table to answer question: Are Service...
Bus 475 guide 1 44) Use the following table to answer question:   Are Service...Bus 475 guide 1 44) Use the following table to answer question:   Are Service...
Bus 475 guide 1 44) Use the following table to answer question: Are Service...
 
Examen veronica
Examen veronicaExamen veronica
Examen veronica
 
sangeeth_CV
sangeeth_CVsangeeth_CV
sangeeth_CV
 
How We Play Tested with Players and Got Results Over the Weekend | Bart van d...
How We Play Tested with Players and Got Results Over the Weekend | Bart van d...How We Play Tested with Players and Got Results Over the Weekend | Bart van d...
How We Play Tested with Players and Got Results Over the Weekend | Bart van d...
 
Titanium, write in java script, run native everywhere
Titanium, write in java script, run native everywhereTitanium, write in java script, run native everywhere
Titanium, write in java script, run native everywhere
 
HD-Oslo-Forum-2014
HD-Oslo-Forum-2014HD-Oslo-Forum-2014
HD-Oslo-Forum-2014
 
THE MOBILE WORKFORCE, VALUE IN A 24/7 BUSINESS
THE MOBILE WORKFORCE,  VALUE IN A 24/7 BUSINESSTHE MOBILE WORKFORCE,  VALUE IN A 24/7 BUSINESS
THE MOBILE WORKFORCE, VALUE IN A 24/7 BUSINESS
 
WebServices Basic Overview
WebServices Basic OverviewWebServices Basic Overview
WebServices Basic Overview
 
Orientación Académica 4ºESO
Orientación Académica 4ºESOOrientación Académica 4ºESO
Orientación Académica 4ºESO
 
Ujian percubaan upsr 2015 n9 - matematik kertas 2
Ujian percubaan upsr 2015   n9 - matematik kertas 2Ujian percubaan upsr 2015   n9 - matematik kertas 2
Ujian percubaan upsr 2015 n9 - matematik kertas 2
 
Anem al supermercat_ MATERIAL TEA
Anem al supermercat_ MATERIAL TEAAnem al supermercat_ MATERIAL TEA
Anem al supermercat_ MATERIAL TEA
 
Ujian bulanan mac 2016 BM Tahun 6 Kertas 2
Ujian bulanan mac 2016 BM Tahun 6 Kertas 2Ujian bulanan mac 2016 BM Tahun 6 Kertas 2
Ujian bulanan mac 2016 BM Tahun 6 Kertas 2
 
Cuentas por pagar a corto plazo cap. 17 eqpo. 7
Cuentas por pagar a corto plazo cap. 17 eqpo. 7Cuentas por pagar a corto plazo cap. 17 eqpo. 7
Cuentas por pagar a corto plazo cap. 17 eqpo. 7
 

Ähnlich wie Examen Cisco Yesica Cañaveral

Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Đồng Quốc Vương
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
Miz Malinz
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
Nik Ainy
 

Ähnlich wie Examen Cisco Yesica Cañaveral (20)

Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internet
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Module 1 : Introduction to Internet
Module 1 : Introduction to Internet Module 1 : Introduction to Internet
Module 1 : Introduction to Internet
 
Module Introduction
Module IntroductionModule Introduction
Module Introduction
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
 
Module 201 intro 20 internet
Module 201 intro 20 internetModule 201 intro 20 internet
Module 201 intro 20 internet
 
Module Internet
Module Internet Module Internet
Module Internet
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
 
Mod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdfMod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdf
 
networking concepts
networking conceptsnetworking concepts
networking concepts
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 

Mehr von Once Redes

Que es criptografia mariana puerta
Que es criptografia mariana puertaQue es criptografia mariana puerta
Que es criptografia mariana puerta
Once Redes
 
Tarea mariana puerta
Tarea mariana puerta Tarea mariana puerta
Tarea mariana puerta
Once Redes
 
Redes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahitaRedes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahita
Once Redes
 
Taller de induccion mariana puerta
Taller de induccion mariana puertaTaller de induccion mariana puerta
Taller de induccion mariana puerta
Once Redes
 
Lenguajes de programación mariana puerta
Lenguajes de programación mariana puertaLenguajes de programación mariana puerta
Lenguajes de programación mariana puerta
Once Redes
 
Maquinas virtuales mariana puerta
Maquinas virtuales mariana puertaMaquinas virtuales mariana puerta
Maquinas virtuales mariana puerta
Once Redes
 
Sara muñoz alejandra zabala
Sara muñoz  alejandra zabalaSara muñoz  alejandra zabala
Sara muñoz alejandra zabala
Once Redes
 
Alejandra zabala (2)
Alejandra zabala (2)Alejandra zabala (2)
Alejandra zabala (2)
Once Redes
 
Configuracion del rou ter mariana puerta
Configuracion del rou ter mariana puertaConfiguracion del rou ter mariana puerta
Configuracion del rou ter mariana puerta
Once Redes
 
Alejandra zabala (1)
Alejandra zabala (1)Alejandra zabala (1)
Alejandra zabala (1)
Once Redes
 
Web quest seguridad informática sara muñoz alejandra zabala
Web quest seguridad informática sara muñoz   alejandra zabalaWeb quest seguridad informática sara muñoz   alejandra zabala
Web quest seguridad informática sara muñoz alejandra zabala
Once Redes
 
Redes wan alejandra zabala
Redes wan  alejandra zabala Redes wan  alejandra zabala
Redes wan alejandra zabala
Once Redes
 
Alejandra zabala
Alejandra zabalaAlejandra zabala
Alejandra zabala
Once Redes
 
Redes wan alysson villamil
Redes wan alysson villamil  Redes wan alysson villamil
Redes wan alysson villamil
Once Redes
 
Lista de chequeo mariana puerta
Lista de chequeo mariana puertaLista de chequeo mariana puerta
Lista de chequeo mariana puerta
Once Redes
 

Mehr von Once Redes (20)

Formato proyecto-productivo media-técnica-medellin-digital
Formato proyecto-productivo media-técnica-medellin-digitalFormato proyecto-productivo media-técnica-medellin-digital
Formato proyecto-productivo media-técnica-medellin-digital
 
Como ser un emprendedor
Como ser un emprendedorComo ser un emprendedor
Como ser un emprendedor
 
Que es criptografia mariana puerta
Que es criptografia mariana puertaQue es criptografia mariana puerta
Que es criptografia mariana puerta
 
Tarea mariana puerta
Tarea mariana puerta Tarea mariana puerta
Tarea mariana puerta
 
Redes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahitaRedes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahita
 
Taller de induccion mariana puerta
Taller de induccion mariana puertaTaller de induccion mariana puerta
Taller de induccion mariana puerta
 
Lenguajes de programación mariana puerta
Lenguajes de programación mariana puertaLenguajes de programación mariana puerta
Lenguajes de programación mariana puerta
 
Maquinas virtuales mariana puerta
Maquinas virtuales mariana puertaMaquinas virtuales mariana puerta
Maquinas virtuales mariana puerta
 
Sara muñoz alejandra zabala
Sara muñoz  alejandra zabalaSara muñoz  alejandra zabala
Sara muñoz alejandra zabala
 
Alejandra zabala (2)
Alejandra zabala (2)Alejandra zabala (2)
Alejandra zabala (2)
 
Configuracion del rou ter mariana puerta
Configuracion del rou ter mariana puertaConfiguracion del rou ter mariana puerta
Configuracion del rou ter mariana puerta
 
Alejandra zabala (1)
Alejandra zabala (1)Alejandra zabala (1)
Alejandra zabala (1)
 
Web quest seguridad informática sara muñoz alejandra zabala
Web quest seguridad informática sara muñoz   alejandra zabalaWeb quest seguridad informática sara muñoz   alejandra zabala
Web quest seguridad informática sara muñoz alejandra zabala
 
Redes wan alejandra zabala
Redes wan  alejandra zabala Redes wan  alejandra zabala
Redes wan alejandra zabala
 
Alejandra zabala
Alejandra zabalaAlejandra zabala
Alejandra zabala
 
Taller de induccion a las redes isabel macias
 Taller de induccion a las redes isabel macias Taller de induccion a las redes isabel macias
Taller de induccion a las redes isabel macias
 
Redes wan alysson villamil
Redes wan alysson villamil  Redes wan alysson villamil
Redes wan alysson villamil
 
Criptografia
Criptografia Criptografia
Criptografia
 
Lista de chequeo mariana puerta
Lista de chequeo mariana puertaLista de chequeo mariana puerta
Lista de chequeo mariana puerta
 
Alysson Villamil
Alysson Villamil Alysson Villamil
Alysson Villamil
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Examen Cisco Yesica Cañaveral

  • 1. EXAMEN CISCO CCNA 1 Chapter 1 v5 Exam Answers Time limit: 00:58:37 1. Question 1. Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.) 1. cellular 2. DSL 3. satellite 4. cable 5. dial-up telephone 2. Question 2. What type of network must a home user access in order to do online shopping? 1. a local area network 2. the Internet 3. an extranet 4. an intranet
  • 2. 3. Question 3. What are two functions of intermediary devices on a network? (Choose two.) 1. They are the primary source and providers of information and services to end devices. 2. They form the interface between the human network and the underlying communication network. 3. They direct data along alternate pathways when there is a link failure. 4. They run applications that support collaboration for business. 5. They filter the flow of data, based on security settings. 4. Question 4. Fill in the blank. 1. The acronym refers to the trend of end users being able to use their personal devices to access the business network and resources. 5. Question 5. Which description correctly defines a converged network? 1. a network that allows users to interact directly with each other over multiple channels 2. a network that is limited to exchanging character-based information 3. a dedicated network with separate channels for video and voice services
  • 3. 4. a single network channel capable of delivering multiple communication forms 6. Question 6. Drag and drop Match each characteristic to its corresponding internet conectivity type. Sort elements 1. splits the access line into three signals 2. typically has very low bandwidth 3. Not suited for heavily wooded areas 4. uses coaxial cable as a medium satellite dialup telephone DSL cable 7. 7. Question 7. Drag and drop Match the form of network communication with its description.
  • 4. Sort elements 1. wiki 2. Social media 3. instant messaging 4. podcast Web pages that groups of people can edit and view together Interactive websites where people created and share user- generated content with friends and family real-time communication of between two or more people an audio-based medium that allows people to deliver their recordings to a wide
  • 5. audience 8. Question 8. Drag and drop Match each definition to the corresponding security goal: Sort elements 1. the assurance that the information has not been altered during transmission 2. the assurance of timely and reliable access to data 3. only the intended recipients can access and read the data maintaining integrity ensuring confidentiality ensuring availability 9. Question 9. Which statement describes a characteristic of cloud computing? 1. A business can connect directly to the Internet without the use of an ISP. 2. Devices can connect to the Internet through existing electrical wiring.
  • 6. 3. Investment in new infrastructure is required in order to access the cloud. 4. Applications can be accessed over the Internet through a subscription. 10. Question 10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) 1. cellular 2. dialup 3. satellite 4. DSL 5. dedicated leased line 11. Question 11. What is a characteristic of circuit-switched networks? 1. A single message can be broken into multiple message blocks that are transmitted through multiple circuits simultaneously. 2. If all circuits are busy, a new call cannot be placed. 3. If a circuit fails, the call will be forwarded on a new path.
  • 7. 4. Circuit-switched networks can dynamically learn and use redundant circuits. 12. Question 12. Requiring strong, complex passwords is a practice that supports which network security goal? 1. maintaining communication integrity 2. ensuring redundancy 3. ensuring data confidentiality 4. ensuring reliability of access 13. Question 13. What two criteria are used to help select network media? (Choose two.) 1. the distance the media can successfully carry a signal 2. the environment where the media is to be installed 3. the cost of the end devices utilized in the network 4. the number of intermediary devices installed in the network 5. the types of data that need to be prioritized 14. Question 14. Which statement describes a network that supports QoS?
  • 8. 1. Data sent over the network is not altered in transmission. 2. The fewest possible devices are affected by a failure. 3. The network provides predictable levels of service to different types of traffic. 4. The network should be able to expand to keep up with user demand. 15. Question Refer to the exhibit. Which set of devices contains only intermediary devices? 1. A, B, E, F 2. A, B, D, G
  • 9. 3. G, H, I, J 4. C, D, G, I 16. Question 16. Which device performs the function of determining the path that messages should take through internetworks? 1. a web server 2. a DSL modem 3. a router 4. a firewall 17. Question 17. Which tool provides real-time video and audio communication over the Internet so that businesses can conduct corporate meetings with participants from several remote locations? 1. wiki 2. instant messaging 3. weblog 4. TelePresence 18. Question
  • 10. 18. Which two statements about the relationship between LANs and WANs are true? (Choose two.) 1. Both LANs and WANs connect end devices. . 2. WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals. 3. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices. 4. The Internet is a WAN. 5. WANs must be publicly-owned, but LANs can be owned by either public or private entities 19. Question 19. Which three network tools provide the minimum required security protection for home users? (Choose three.) 1. antivirus software 2. antispyware software 3. an intrusion prevention system 4. powerline networking 5. a firewall
  • 11. 6. access control lists 20. Question 20. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? 1. intranet 2. wired LAN 3. wireless LAN 4. extranet 5. wireless WAN 21. Question 21. Which expression accurately defines the term congestion? 1. a method of limiting the impact of a hardware or software failure on the network 2. a set of techniques to manage the utilization of network resources 3. a state where the demand on the network resources exceeds the available capacity 4. a measure of the data carrying capacity of the network 22. Question
  • 12. What two criteria are used to help select a network medium from various network media? (Choose two.) 1. the types of data that need to be prioritized 2. the cost of the end devices utilized in the network 3. the number of intermediary devices installed in the network 4. the environment where the selected medium is to be installed 5. the distance the selected medium can successfully carry a signal 23. Question 23. Which term describes the state of a network when the demand on the network resources exceeds the available capacity? 1. optimization 2. congestion 3. convergence 4. synchronization