SlideShare a Scribd company logo
1 of 12
Download to read offline
EXAMEN CISCO
CCNA 1 Chapter 1 v5 Exam Answers
Time limit: 00:58:37
1. Question
1. Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a
LAN? (Choose two.)
1. cellular
2. DSL
3. satellite
4. cable
5. dial-up telephone
2. Question
2. What type of network must a home user access in order to do online shopping?
1. a local area network
2. the Internet
3. an extranet
4. an intranet
3. Question
3. What are two functions of intermediary devices on a network? (Choose two.)
1. They are the primary source and providers of information and services to end devices.
2. They form the interface between the human network and the underlying communication
network.
3. They direct data along alternate pathways when there is a link failure.
4. They run applications that support collaboration for business.
5. They filter the flow of data, based on security settings.
4. Question
4. Fill in the blank.
1. The acronym refers to the trend of end users being able to use their personal
devices to access the business network and resources.
5. Question
5. Which description correctly defines a converged network?
1. a network that allows users to interact directly with each other over multiple channels
2. a network that is limited to exchanging character-based information
3. a dedicated network with separate channels for video and voice services
4. a single network channel capable of delivering multiple communication forms
6. Question
6. Drag and drop
Match each characteristic to its corresponding internet conectivity type.
Sort elements
1. splits the access line into three signals
2. typically has very low bandwidth
3. Not suited for heavily wooded areas
4. uses coaxial cable as a medium
satellite
dialup telephone
DSL
cable
7. 7. Question
7.
Drag and drop
Match the form of network communication with its description.
Sort elements
1. wiki
2. Social media
3. instant messaging
4. podcast
Web pages that
groups of people can
edit and view
together
Interactive websites
where people created
and share user-
generated content
with friends and
family
real-time
communication of
between two or more
people
an audio-based
medium that allows
people to deliver their
recordings to a wide
audience
8. Question
8. Drag and drop
Match each definition to the corresponding security goal:
Sort elements
1. the assurance that the information has not been altered during transmission
2. the assurance of timely and reliable access to data
3. only the intended recipients can access and read the data
maintaining integrity
ensuring
confidentiality
ensuring availability
9. Question
9. Which statement describes a characteristic of cloud computing?
1. A business can connect directly to the Internet without the use of an ISP.
2. Devices can connect to the Internet through existing electrical wiring.
3. Investment in new infrastructure is required in order to access the cloud.
4. Applications can be accessed over the Internet through a subscription.
10. Question
10. Which two Internet connection options do not require that physical cables be run to the building?
(Choose two.)
1. cellular
2. dialup
3. satellite
4. DSL
5. dedicated leased line
11. Question
11. What is a characteristic of circuit-switched networks?
1. A single message can be broken into multiple message blocks that are transmitted through
multiple circuits simultaneously.
2. If all circuits are busy, a new call cannot be placed.
3. If a circuit fails, the call will be forwarded on a new path.
4. Circuit-switched networks can dynamically learn and use redundant circuits.
12. Question
12. Requiring strong, complex passwords is a practice that supports which network security goal?
1. maintaining communication integrity
2. ensuring redundancy
3. ensuring data confidentiality
4. ensuring reliability of access
13. Question
13. What two criteria are used to help select network media? (Choose two.)
1. the distance the media can successfully carry a signal
2. the environment where the media is to be installed
3. the cost of the end devices utilized in the network
4. the number of intermediary devices installed in the network
5. the types of data that need to be prioritized
14. Question
14. Which statement describes a network that supports QoS?
1. Data sent over the network is not altered in transmission.
2. The fewest possible devices are affected by a failure.
3. The network provides predictable levels of service to different types of traffic.
4. The network should be able to expand to keep up with user demand.
15. Question
Refer to the exhibit. Which set of devices contains only intermediary devices?
1. A, B, E, F
2. A, B, D, G
3. G, H, I, J
4. C, D, G, I
16. Question
16. Which device performs the function of determining the path that messages should take through
internetworks?
1. a web server
2. a DSL modem
3. a router
4. a firewall
17. Question
17. Which tool provides real-time video and audio communication over the Internet so that businesses
can conduct corporate meetings with participants from several remote locations?
1. wiki
2. instant messaging
3. weblog
4. TelePresence
18. Question
18. Which two statements about the relationship between LANs and WANs are true? (Choose two.)
1. Both LANs and WANs connect end devices. .
2. WANs are typically operated through multiple ISPs, but LANs are typically operated by
single organizations or individuals.
3. WANs connect LANs at slower speed bandwidth than LANs connect their internal end
devices.
4. The Internet is a WAN.
5. WANs must be publicly-owned, but LANs can be owned by either public or private entities
19. Question
19. Which three network tools provide the minimum required security protection for home users?
(Choose three.)
1. antivirus software
2. antispyware software
3. an intrusion prevention system
4. powerline networking
5. a firewall
6. access control lists
20. Question
20. Which area of the network would a college IT staff most likely have to redesign as a direct result of
many students bringing their own tablets and smartphones to school to access school resources?
1. intranet
2. wired LAN
3. wireless LAN
4. extranet
5. wireless WAN
21. Question
21. Which expression accurately defines the term congestion?
1. a method of limiting the impact of a hardware or software failure on the network
2. a set of techniques to manage the utilization of network resources
3. a state where the demand on the network resources exceeds the available capacity
4. a measure of the data carrying capacity of the network
22. Question
What two criteria are used to help select a network medium from various network media? (Choose
two.)
1. the types of data that need to be prioritized
2. the cost of the end devices utilized in the network
3. the number of intermediary devices installed in the network
4. the environment where the selected medium is to be installed
5. the distance the selected medium can successfully carry a signal
23. Question
23. Which term describes the state of a network when the demand on the network resources exceeds
the available capacity?
1. optimization
2. congestion
3. convergence
4. synchronization

More Related Content

What's hot

Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms InternetIRJET Journal
 
Paper id 71201996
Paper id 71201996Paper id 71201996
Paper id 71201996IJRAT
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017Sharonp15
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...IJECEIAES
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Thamalsha Wijayarathna
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area networkIAEME Publication
 

What's hot (7)

Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms Internet
 
Paper id 71201996
Paper id 71201996Paper id 71201996
Paper id 71201996
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
 
Synopsis
SynopsisSynopsis
Synopsis
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area network
 

Viewers also liked

Bus 475 guide 1 44) Use the following table to answer question: Are Service...
Bus 475 guide 1 44) Use the following table to answer question:   Are Service...Bus 475 guide 1 44) Use the following table to answer question:   Are Service...
Bus 475 guide 1 44) Use the following table to answer question: Are Service...jackkumaran
 
Examen veronica
Examen veronicaExamen veronica
Examen veronicaverito161
 
How We Play Tested with Players and Got Results Over the Weekend | Bart van d...
How We Play Tested with Players and Got Results Over the Weekend | Bart van d...How We Play Tested with Players and Got Results Over the Weekend | Bart van d...
How We Play Tested with Players and Got Results Over the Weekend | Bart van d...Jessica Tams
 
Titanium, write in java script, run native everywhere
Titanium, write in java script, run native everywhereTitanium, write in java script, run native everywhere
Titanium, write in java script, run native everywhereAyoub Zamouchi
 
THE MOBILE WORKFORCE, VALUE IN A 24/7 BUSINESS
THE MOBILE WORKFORCE,  VALUE IN A 24/7 BUSINESSTHE MOBILE WORKFORCE,  VALUE IN A 24/7 BUSINESS
THE MOBILE WORKFORCE, VALUE IN A 24/7 BUSINESSBrady Behrman
 
WebServices Basic Overview
WebServices Basic OverviewWebServices Basic Overview
WebServices Basic OverviewRajkattamuri
 
Ujian percubaan upsr 2015 n9 - matematik kertas 2
Ujian percubaan upsr 2015   n9 - matematik kertas 2Ujian percubaan upsr 2015   n9 - matematik kertas 2
Ujian percubaan upsr 2015 n9 - matematik kertas 2Wan Fadh
 
Anem al supermercat_ MATERIAL TEA
Anem al supermercat_ MATERIAL TEAAnem al supermercat_ MATERIAL TEA
Anem al supermercat_ MATERIAL TEAEsther Rodriguez
 
Ujian bulanan mac 2016 BM Tahun 6 Kertas 2
Ujian bulanan mac 2016 BM Tahun 6 Kertas 2Ujian bulanan mac 2016 BM Tahun 6 Kertas 2
Ujian bulanan mac 2016 BM Tahun 6 Kertas 2Sudhan Nathan
 
Cuentas por pagar a corto plazo cap. 17 eqpo. 7
Cuentas por pagar a corto plazo cap. 17 eqpo. 7Cuentas por pagar a corto plazo cap. 17 eqpo. 7
Cuentas por pagar a corto plazo cap. 17 eqpo. 7Alfredo Hernandez
 

Viewers also liked (13)

Bus 475 guide 1 44) Use the following table to answer question: Are Service...
Bus 475 guide 1 44) Use the following table to answer question:   Are Service...Bus 475 guide 1 44) Use the following table to answer question:   Are Service...
Bus 475 guide 1 44) Use the following table to answer question: Are Service...
 
Examen veronica
Examen veronicaExamen veronica
Examen veronica
 
sangeeth_CV
sangeeth_CVsangeeth_CV
sangeeth_CV
 
How We Play Tested with Players and Got Results Over the Weekend | Bart van d...
How We Play Tested with Players and Got Results Over the Weekend | Bart van d...How We Play Tested with Players and Got Results Over the Weekend | Bart van d...
How We Play Tested with Players and Got Results Over the Weekend | Bart van d...
 
Titanium, write in java script, run native everywhere
Titanium, write in java script, run native everywhereTitanium, write in java script, run native everywhere
Titanium, write in java script, run native everywhere
 
HD-Oslo-Forum-2014
HD-Oslo-Forum-2014HD-Oslo-Forum-2014
HD-Oslo-Forum-2014
 
THE MOBILE WORKFORCE, VALUE IN A 24/7 BUSINESS
THE MOBILE WORKFORCE,  VALUE IN A 24/7 BUSINESSTHE MOBILE WORKFORCE,  VALUE IN A 24/7 BUSINESS
THE MOBILE WORKFORCE, VALUE IN A 24/7 BUSINESS
 
WebServices Basic Overview
WebServices Basic OverviewWebServices Basic Overview
WebServices Basic Overview
 
Orientación Académica 4ºESO
Orientación Académica 4ºESOOrientación Académica 4ºESO
Orientación Académica 4ºESO
 
Ujian percubaan upsr 2015 n9 - matematik kertas 2
Ujian percubaan upsr 2015   n9 - matematik kertas 2Ujian percubaan upsr 2015   n9 - matematik kertas 2
Ujian percubaan upsr 2015 n9 - matematik kertas 2
 
Anem al supermercat_ MATERIAL TEA
Anem al supermercat_ MATERIAL TEAAnem al supermercat_ MATERIAL TEA
Anem al supermercat_ MATERIAL TEA
 
Ujian bulanan mac 2016 BM Tahun 6 Kertas 2
Ujian bulanan mac 2016 BM Tahun 6 Kertas 2Ujian bulanan mac 2016 BM Tahun 6 Kertas 2
Ujian bulanan mac 2016 BM Tahun 6 Kertas 2
 
Cuentas por pagar a corto plazo cap. 17 eqpo. 7
Cuentas por pagar a corto plazo cap. 17 eqpo. 7Cuentas por pagar a corto plazo cap. 17 eqpo. 7
Cuentas por pagar a corto plazo cap. 17 eqpo. 7
 

Similar to Examen Cisco Yesica Cañaveral

Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5atom1716
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersAlithea Barbosa
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN BASHA
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Đồng Quốc Vương
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetMiz Malinz
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internetNik Ainy
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internetFatin Izzaty
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Module Introduction
Module IntroductionModule Introduction
Module IntroductionIra Raji
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internetairiel hamka
 
Module 201 intro 20 internet
Module 201 intro 20 internetModule 201 intro 20 internet
Module 201 intro 20 internetNick Racers
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
 
networking concepts
networking conceptsnetworking concepts
networking conceptsmtguillermo
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internetNur Azlina
 

Similar to Examen Cisco Yesica Cañaveral (20)

Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internet
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Module 1 : Introduction to Internet
Module 1 : Introduction to Internet Module 1 : Introduction to Internet
Module 1 : Introduction to Internet
 
Module Introduction
Module IntroductionModule Introduction
Module Introduction
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
 
Module 201 intro 20 internet
Module 201 intro 20 internetModule 201 intro 20 internet
Module 201 intro 20 internet
 
Module Internet
Module Internet Module Internet
Module Internet
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
 
Mod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdfMod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdf
 
networking concepts
networking conceptsnetworking concepts
networking concepts
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 

More from Once Redes

Formato proyecto-productivo media-técnica-medellin-digital
Formato proyecto-productivo media-técnica-medellin-digitalFormato proyecto-productivo media-técnica-medellin-digital
Formato proyecto-productivo media-técnica-medellin-digitalOnce Redes
 
Como ser un emprendedor
Como ser un emprendedorComo ser un emprendedor
Como ser un emprendedorOnce Redes
 
Que es criptografia mariana puerta
Que es criptografia mariana puertaQue es criptografia mariana puerta
Que es criptografia mariana puertaOnce Redes
 
Tarea mariana puerta
Tarea mariana puerta Tarea mariana puerta
Tarea mariana puerta Once Redes
 
Redes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahitaRedes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahitaOnce Redes
 
Taller de induccion mariana puerta
Taller de induccion mariana puertaTaller de induccion mariana puerta
Taller de induccion mariana puertaOnce Redes
 
Lenguajes de programación mariana puerta
Lenguajes de programación mariana puertaLenguajes de programación mariana puerta
Lenguajes de programación mariana puertaOnce Redes
 
Maquinas virtuales mariana puerta
Maquinas virtuales mariana puertaMaquinas virtuales mariana puerta
Maquinas virtuales mariana puertaOnce Redes
 
Sara muñoz alejandra zabala
Sara muñoz  alejandra zabalaSara muñoz  alejandra zabala
Sara muñoz alejandra zabalaOnce Redes
 
Alejandra zabala (2)
Alejandra zabala (2)Alejandra zabala (2)
Alejandra zabala (2)Once Redes
 
Configuracion del rou ter mariana puerta
Configuracion del rou ter mariana puertaConfiguracion del rou ter mariana puerta
Configuracion del rou ter mariana puertaOnce Redes
 
Alejandra zabala (1)
Alejandra zabala (1)Alejandra zabala (1)
Alejandra zabala (1)Once Redes
 
Web quest seguridad informática sara muñoz alejandra zabala
Web quest seguridad informática sara muñoz   alejandra zabalaWeb quest seguridad informática sara muñoz   alejandra zabala
Web quest seguridad informática sara muñoz alejandra zabalaOnce Redes
 
Redes wan alejandra zabala
Redes wan  alejandra zabala Redes wan  alejandra zabala
Redes wan alejandra zabala Once Redes
 
Alejandra zabala
Alejandra zabalaAlejandra zabala
Alejandra zabalaOnce Redes
 
Taller de induccion a las redes isabel macias
 Taller de induccion a las redes isabel macias Taller de induccion a las redes isabel macias
Taller de induccion a las redes isabel maciasOnce Redes
 
Redes wan alysson villamil
Redes wan alysson villamil  Redes wan alysson villamil
Redes wan alysson villamil Once Redes
 
Lista de chequeo mariana puerta
Lista de chequeo mariana puertaLista de chequeo mariana puerta
Lista de chequeo mariana puertaOnce Redes
 
Alysson Villamil
Alysson Villamil Alysson Villamil
Alysson Villamil Once Redes
 

More from Once Redes (20)

Formato proyecto-productivo media-técnica-medellin-digital
Formato proyecto-productivo media-técnica-medellin-digitalFormato proyecto-productivo media-técnica-medellin-digital
Formato proyecto-productivo media-técnica-medellin-digital
 
Como ser un emprendedor
Como ser un emprendedorComo ser un emprendedor
Como ser un emprendedor
 
Que es criptografia mariana puerta
Que es criptografia mariana puertaQue es criptografia mariana puerta
Que es criptografia mariana puerta
 
Tarea mariana puerta
Tarea mariana puerta Tarea mariana puerta
Tarea mariana puerta
 
Redes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahitaRedes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahita
 
Taller de induccion mariana puerta
Taller de induccion mariana puertaTaller de induccion mariana puerta
Taller de induccion mariana puerta
 
Lenguajes de programación mariana puerta
Lenguajes de programación mariana puertaLenguajes de programación mariana puerta
Lenguajes de programación mariana puerta
 
Maquinas virtuales mariana puerta
Maquinas virtuales mariana puertaMaquinas virtuales mariana puerta
Maquinas virtuales mariana puerta
 
Sara muñoz alejandra zabala
Sara muñoz  alejandra zabalaSara muñoz  alejandra zabala
Sara muñoz alejandra zabala
 
Alejandra zabala (2)
Alejandra zabala (2)Alejandra zabala (2)
Alejandra zabala (2)
 
Configuracion del rou ter mariana puerta
Configuracion del rou ter mariana puertaConfiguracion del rou ter mariana puerta
Configuracion del rou ter mariana puerta
 
Alejandra zabala (1)
Alejandra zabala (1)Alejandra zabala (1)
Alejandra zabala (1)
 
Web quest seguridad informática sara muñoz alejandra zabala
Web quest seguridad informática sara muñoz   alejandra zabalaWeb quest seguridad informática sara muñoz   alejandra zabala
Web quest seguridad informática sara muñoz alejandra zabala
 
Redes wan alejandra zabala
Redes wan  alejandra zabala Redes wan  alejandra zabala
Redes wan alejandra zabala
 
Alejandra zabala
Alejandra zabalaAlejandra zabala
Alejandra zabala
 
Taller de induccion a las redes isabel macias
 Taller de induccion a las redes isabel macias Taller de induccion a las redes isabel macias
Taller de induccion a las redes isabel macias
 
Redes wan alysson villamil
Redes wan alysson villamil  Redes wan alysson villamil
Redes wan alysson villamil
 
Criptografia
Criptografia Criptografia
Criptografia
 
Lista de chequeo mariana puerta
Lista de chequeo mariana puertaLista de chequeo mariana puerta
Lista de chequeo mariana puerta
 
Alysson Villamil
Alysson Villamil Alysson Villamil
Alysson Villamil
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Examen Cisco Yesica Cañaveral

  • 1. EXAMEN CISCO CCNA 1 Chapter 1 v5 Exam Answers Time limit: 00:58:37 1. Question 1. Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.) 1. cellular 2. DSL 3. satellite 4. cable 5. dial-up telephone 2. Question 2. What type of network must a home user access in order to do online shopping? 1. a local area network 2. the Internet 3. an extranet 4. an intranet
  • 2. 3. Question 3. What are two functions of intermediary devices on a network? (Choose two.) 1. They are the primary source and providers of information and services to end devices. 2. They form the interface between the human network and the underlying communication network. 3. They direct data along alternate pathways when there is a link failure. 4. They run applications that support collaboration for business. 5. They filter the flow of data, based on security settings. 4. Question 4. Fill in the blank. 1. The acronym refers to the trend of end users being able to use their personal devices to access the business network and resources. 5. Question 5. Which description correctly defines a converged network? 1. a network that allows users to interact directly with each other over multiple channels 2. a network that is limited to exchanging character-based information 3. a dedicated network with separate channels for video and voice services
  • 3. 4. a single network channel capable of delivering multiple communication forms 6. Question 6. Drag and drop Match each characteristic to its corresponding internet conectivity type. Sort elements 1. splits the access line into three signals 2. typically has very low bandwidth 3. Not suited for heavily wooded areas 4. uses coaxial cable as a medium satellite dialup telephone DSL cable 7. 7. Question 7. Drag and drop Match the form of network communication with its description.
  • 4. Sort elements 1. wiki 2. Social media 3. instant messaging 4. podcast Web pages that groups of people can edit and view together Interactive websites where people created and share user- generated content with friends and family real-time communication of between two or more people an audio-based medium that allows people to deliver their recordings to a wide
  • 5. audience 8. Question 8. Drag and drop Match each definition to the corresponding security goal: Sort elements 1. the assurance that the information has not been altered during transmission 2. the assurance of timely and reliable access to data 3. only the intended recipients can access and read the data maintaining integrity ensuring confidentiality ensuring availability 9. Question 9. Which statement describes a characteristic of cloud computing? 1. A business can connect directly to the Internet without the use of an ISP. 2. Devices can connect to the Internet through existing electrical wiring.
  • 6. 3. Investment in new infrastructure is required in order to access the cloud. 4. Applications can be accessed over the Internet through a subscription. 10. Question 10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) 1. cellular 2. dialup 3. satellite 4. DSL 5. dedicated leased line 11. Question 11. What is a characteristic of circuit-switched networks? 1. A single message can be broken into multiple message blocks that are transmitted through multiple circuits simultaneously. 2. If all circuits are busy, a new call cannot be placed. 3. If a circuit fails, the call will be forwarded on a new path.
  • 7. 4. Circuit-switched networks can dynamically learn and use redundant circuits. 12. Question 12. Requiring strong, complex passwords is a practice that supports which network security goal? 1. maintaining communication integrity 2. ensuring redundancy 3. ensuring data confidentiality 4. ensuring reliability of access 13. Question 13. What two criteria are used to help select network media? (Choose two.) 1. the distance the media can successfully carry a signal 2. the environment where the media is to be installed 3. the cost of the end devices utilized in the network 4. the number of intermediary devices installed in the network 5. the types of data that need to be prioritized 14. Question 14. Which statement describes a network that supports QoS?
  • 8. 1. Data sent over the network is not altered in transmission. 2. The fewest possible devices are affected by a failure. 3. The network provides predictable levels of service to different types of traffic. 4. The network should be able to expand to keep up with user demand. 15. Question Refer to the exhibit. Which set of devices contains only intermediary devices? 1. A, B, E, F 2. A, B, D, G
  • 9. 3. G, H, I, J 4. C, D, G, I 16. Question 16. Which device performs the function of determining the path that messages should take through internetworks? 1. a web server 2. a DSL modem 3. a router 4. a firewall 17. Question 17. Which tool provides real-time video and audio communication over the Internet so that businesses can conduct corporate meetings with participants from several remote locations? 1. wiki 2. instant messaging 3. weblog 4. TelePresence 18. Question
  • 10. 18. Which two statements about the relationship between LANs and WANs are true? (Choose two.) 1. Both LANs and WANs connect end devices. . 2. WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals. 3. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices. 4. The Internet is a WAN. 5. WANs must be publicly-owned, but LANs can be owned by either public or private entities 19. Question 19. Which three network tools provide the minimum required security protection for home users? (Choose three.) 1. antivirus software 2. antispyware software 3. an intrusion prevention system 4. powerline networking 5. a firewall
  • 11. 6. access control lists 20. Question 20. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? 1. intranet 2. wired LAN 3. wireless LAN 4. extranet 5. wireless WAN 21. Question 21. Which expression accurately defines the term congestion? 1. a method of limiting the impact of a hardware or software failure on the network 2. a set of techniques to manage the utilization of network resources 3. a state where the demand on the network resources exceeds the available capacity 4. a measure of the data carrying capacity of the network 22. Question
  • 12. What two criteria are used to help select a network medium from various network media? (Choose two.) 1. the types of data that need to be prioritized 2. the cost of the end devices utilized in the network 3. the number of intermediary devices installed in the network 4. the environment where the selected medium is to be installed 5. the distance the selected medium can successfully carry a signal 23. Question 23. Which term describes the state of a network when the demand on the network resources exceeds the available capacity? 1. optimization 2. congestion 3. convergence 4. synchronization