SlideShare a Scribd company logo
Chapter 1

True/False
Indicate whether the statement is true or false.

____    1. Two computers connected by a wire cable form a network.

____    2. In 1954, the International Organization for Standardization (ISO) presented the Open Systems Interconnection
           (OSI) model.

____    3. Computers must use a common protocol to communicate properly.

____    4. Peer communication allows error checking to occur on two separate layers simultaneously.

____    5. Many LANs and WANs contain several segments. Dividing a network into segments reduces performance.


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    6. The term ____ refers to the wire cabling, such as coaxial or the more commonly used twisted-pair, that form
           the connections in most networks.
           a. media                                        c. server
           b. EMI                                          d. node

____    7. ____ networks have computers that are servers and computers that act as clients to those servers.
           a. EMI                                         c. Peer-to-node
           b. Peer-to-peer                                d. Client/server
____    8. A ____ is contained within a company or department and located in a single geographic area, usually a
           building or part of a building.
           a. WAN                                        c. SAN
           b. LAN                                        d. MAN
____    9. A ____ spans multiple geographic areas and is usually connected by common telecommunication carriers.
           a. LAN                                         c. WAN
           b. SAN                                         d. MAN
____ 10. The term ____ refers to the intermediate stage between a LAN and a WAN.
         a. SAN                                          c. WAN
         b. LAN                                          d. MAN
____ 11. The term ____ refers to a series of storage devices, such as tapes, hard drives, and CDs, that are networked
         together to provide very fast data storage for a network or subnetwork.
         a. MAN                                            c. SAN
         b. WAN                                            d. LAN
____ 12. The part of the company’s network that allows access to nonemployees is called the ____, which is accessed
         over or through the Internet.
         a. intranet                                    c. publicnet
         b. extranet                                    d. privatenet
____ 13. The part of the company’s network that allows access to employees is called the ____, which is completely
         separate from the Internet.
         a. intranet                                    c. SAN
         b. LAN                                         d. extranet
____ 14. The seven layers of the OSI reference model communicate with one another via ____ communication.
         a. multicast                                  c. peer
         b. logical                                    d. unicast

____ 15. The OSI model ____ layer defines the mechanical, electrical, and procedural events that occur during the
         physical transmission of electronic signals on the wire.
         a. Physical                                      c. Data Link
         b. Transport                                     d. Network

____ 16. The ____ is information that is used to determine whether data was corrupted during transmission.
         a. LLC                                          c. MAC
         b. CRC                                          d. RPC
____ 17. The ____ sublayer of the Data Link layer defines how data is packaged for the network.
         a. MAC                                         c. CRC
         b. RPC                                         d. LLC
____ 18. The ____ sublayer of the Data Link layer defines the media access method and provides a unique identifier
         for the network card.
         a. MAC                                         c. RPC
         b. LLC                                         d. CRC
____ 19. A(n) ____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network
         card during production.
         a. CRC                                          c. LLC
         b. RPC                                          d. MAC
____ 20. Because the MAC address is added during the manufacturing process, it is a permanent marking. For this
         reason, the address is also known as a ____.
         a. NIC                                       c. CRC
         b. BIA                                       d. CSMA/CD
____ 21. The protocols at the Network layer allow computers to route packets to remote networks using a ____
         address.
         a. burned in                                  c. logical
         b. BIA                                        d. physical
____ 22. ____ protocols, such as TCP, require an acknowledgment (ACK) of the receipt of data packets.
         a. Connectionless                             c. Application-layer
         b. SYN                                        d. Connection-oriented
____ 23. ____ protocols, such as User Datagram Protocol (UDP), do not require an ACK.
         a. Presentation-layer                         c. Connectionless
         b. Connection-oriented                        d. Network-layer
____ 24. Data sent by a connectionless transport is called a ____.
         a. block                                         c. cell
         b. datagram                                      d. package
____ 25. Each layer in a protocol stack may add a(n) ____ to the data as it is passed down the layers.
         a. PDU                                         c. CRC
         b. MTU                                         d. LLC

____ 26. A(n) ____, which is also known as a header or a trailer, is specific information that is sent from one layer on
         the source computer to the same layer on the destination computer.
         a. LLC                                          c. PDU
         b. MTU                                          d. CRC


Completion
Complete each statement.

       27. The term computer network, or simply ____________________, refers to the connection of two or more
           computers by some type of medium.

       28. In a client/server network, the ____________________ host the resources for the clients to use and provide
           security.

       29. A(n) ____________________ is a device that allows a computer or other device to connect to a network
           through the media.

       30. A(n) ____________________ is a network that uses a public communications infrastructure to facilitate
           private communication between a company LAN and remote employees.

       31. As the layers pass the data through the protocol stack, the addition of a header and/or trailer is called
           ____________________.


Matching

            Match each item with a statement below:
            a. EMI                                           f.   Networking software
            b. Infrared                                      g.   Protocol
            c. Peer-to-peer network                          h.   OSI model
            d. NOS                                           i.   Repeaters
            e. Networking hardware
____ 32. term that describes all the physical components of a network
____ 33. a defined method for communicating between systems
____ 34. a wireless transmission media
____ 35. devices that boost the network signal
____ 36. allows communication, security, and distribution of data, files, and applications over a network
____ 37. frequently caused by nearby motors or fluorescent lighting
____ 38. the programs used to run a network
____ 39. when every computer on a network acts as both a client and a server
____ 40. developed as an industry standard for companies to use when developing network hardware and software to
         ensure complete compatibility


Short Answer

      41. Why do we use networks?

      42. Describe various types of servers in a network.

      43. What are virtual private networks?

      44. What are the advantages of a layered networking model?

      45. What are the responsibilities of the OSI model Physical layer?

      46. What are the responsibilities of the OSI model Data Link layer?

      47. What are the functions of the Network layer of the OSI model?

      48. What are the responsibilities of the Transport layer of the OSI model?

      49. What are the services provided by the Session layer of the OSI model?

      50. What are the responsibilities of the Presentation layer of the OSI model

More Related Content

What's hot

Mcq in int
Mcq in intMcq in int
Mcq in int
Karthiga M
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
HarishKumar2054
 
computer communication networks MCQs
 computer communication networks MCQs   computer communication networks MCQs
computer communication networks MCQs
raghad mejeed
 
CN_Lec 5_OSI
CN_Lec 5_OSICN_Lec 5_OSI
CN_Lec 5_OSI
Rijutha Kumar
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
Ahmar Hashmi
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
Routing and switching question1
Routing and switching question1Routing and switching question1
Routing and switching question1
Md. Mashiur Rahman
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomain
NarcisIlie1
 
01 Introduction (CN)
01 Introduction (CN)01 Introduction (CN)
01 Introduction (CN)
Ahmar Hashmi
 
Ccna 1 final exam answer v5
Ccna 1 final exam answer v5Ccna 1 final exam answer v5
Ccna 1 final exam answer v5friv4schoolgames
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
VLSICS Design
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
Md. Mashiur Rahman
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksSwapnil Raut
 
008 stp principle issue1.3bx1
008 stp principle issue1.3bx1008 stp principle issue1.3bx1
008 stp principle issue1.3bx1jcbp_peru
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
Ahmar Hashmi
 

What's hot (20)

Mcq in int
Mcq in intMcq in int
Mcq in int
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
 
Ch22
Ch22Ch22
Ch22
 
computer communication networks MCQs
 computer communication networks MCQs   computer communication networks MCQs
computer communication networks MCQs
 
CN_Lec 5_OSI
CN_Lec 5_OSICN_Lec 5_OSI
CN_Lec 5_OSI
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Routing and switching question1
Routing and switching question1Routing and switching question1
Routing and switching question1
 
Multicast address
Multicast addressMulticast address
Multicast address
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomain
 
01 Introduction (CN)
01 Introduction (CN)01 Introduction (CN)
01 Introduction (CN)
 
Ccna 1 final exam answer v5
Ccna 1 final exam answer v5Ccna 1 final exam answer v5
Ccna 1 final exam answer v5
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
 
008 stp principle issue1.3bx1
008 stp principle issue1.3bx1008 stp principle issue1.3bx1
008 stp principle issue1.3bx1
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 

Viewers also liked

Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheetaromal4frnz
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsDsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsDsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
thetechnicalzone
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
dkaya
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
Swapnil Kapate
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
IT Tech
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
Computer services
Computer servicesComputer services
Computer servicesArz Sy
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
slotiopo
 

Viewers also liked (16)

Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheet
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 
Cisco CCNA module 2
Cisco CCNA module 2Cisco CCNA module 2
Cisco CCNA module 2
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
Computer services
Computer servicesComputer services
Computer services
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
 

Similar to CCNA Introducing Networks Questions

CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices QuestionsDsunte Wilson
 
Mcq for final
Mcq for finalMcq for final
Mcq for final
sazzadulbarihridoy
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
CarmenLamdegil
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
bunyansaturnina
 
Ans.tutorial#2
Ans.tutorial#2Ans.tutorial#2
Ans.tutorial#2
Anandpudur
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Vishal kakade
 
Eidws 108 networks
Eidws 108 networksEidws 108 networks
Eidws 108 networksIT2Alcorn
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsDsunte Wilson
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456
manishazapclub111
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
JeanmarieColbert3
 
資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)
逸 張
 
[Mcq] computer communication networks lmt2
[Mcq] computer communication networks   lmt2[Mcq] computer communication networks   lmt2
[Mcq] computer communication networks lmt2
raghad mejeed
 
exam2
exam2exam2
exam2
EMChief
 
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
wondimagegndesta
 
indroduction of rain technology
indroduction of rain technologyindroduction of rain technology
indroduction of rain technology
narayan dudhe
 
Computer Network Theory Part 4
Computer Network Theory Part 4Computer Network Theory Part 4
Computer Network Theory Part 4
NishatTasnimAli
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsDsunte Wilson
 
FP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QFP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL Q
Syahriha Ruslan
 

Similar to CCNA Introducing Networks Questions (20)

CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
 
Mcq for final
Mcq for finalMcq for final
Mcq for final
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Ans.tutorial#2
Ans.tutorial#2Ans.tutorial#2
Ans.tutorial#2
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
Eidws 108 networks
Eidws 108 networksEidws 108 networks
Eidws 108 networks
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
 
資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)
 
[Mcq] computer communication networks lmt2
[Mcq] computer communication networks   lmt2[Mcq] computer communication networks   lmt2
[Mcq] computer communication networks lmt2
 
exam2
exam2exam2
exam2
 
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
 
indroduction of rain technology
indroduction of rain technologyindroduction of rain technology
indroduction of rain technology
 
Set2 ict-question
Set2 ict-questionSet2 ict-question
Set2 ict-question
 
Computer Network Theory Part 4
Computer Network Theory Part 4Computer Network Theory Part 4
Computer Network Theory Part 4
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
 
FP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QFP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL Q
 

More from Dsunte Wilson

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 

More from Dsunte Wilson (16)

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

CCNA Introducing Networks Questions

  • 1. Chapter 1 True/False Indicate whether the statement is true or false. ____ 1. Two computers connected by a wire cable form a network. ____ 2. In 1954, the International Organization for Standardization (ISO) presented the Open Systems Interconnection (OSI) model. ____ 3. Computers must use a common protocol to communicate properly. ____ 4. Peer communication allows error checking to occur on two separate layers simultaneously. ____ 5. Many LANs and WANs contain several segments. Dividing a network into segments reduces performance. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. The term ____ refers to the wire cabling, such as coaxial or the more commonly used twisted-pair, that form the connections in most networks. a. media c. server b. EMI d. node ____ 7. ____ networks have computers that are servers and computers that act as clients to those servers. a. EMI c. Peer-to-node b. Peer-to-peer d. Client/server ____ 8. A ____ is contained within a company or department and located in a single geographic area, usually a building or part of a building. a. WAN c. SAN b. LAN d. MAN ____ 9. A ____ spans multiple geographic areas and is usually connected by common telecommunication carriers. a. LAN c. WAN b. SAN d. MAN ____ 10. The term ____ refers to the intermediate stage between a LAN and a WAN. a. SAN c. WAN b. LAN d. MAN ____ 11. The term ____ refers to a series of storage devices, such as tapes, hard drives, and CDs, that are networked together to provide very fast data storage for a network or subnetwork. a. MAN c. SAN b. WAN d. LAN ____ 12. The part of the company’s network that allows access to nonemployees is called the ____, which is accessed over or through the Internet. a. intranet c. publicnet b. extranet d. privatenet
  • 2. ____ 13. The part of the company’s network that allows access to employees is called the ____, which is completely separate from the Internet. a. intranet c. SAN b. LAN d. extranet ____ 14. The seven layers of the OSI reference model communicate with one another via ____ communication. a. multicast c. peer b. logical d. unicast ____ 15. The OSI model ____ layer defines the mechanical, electrical, and procedural events that occur during the physical transmission of electronic signals on the wire. a. Physical c. Data Link b. Transport d. Network ____ 16. The ____ is information that is used to determine whether data was corrupted during transmission. a. LLC c. MAC b. CRC d. RPC ____ 17. The ____ sublayer of the Data Link layer defines how data is packaged for the network. a. MAC c. CRC b. RPC d. LLC ____ 18. The ____ sublayer of the Data Link layer defines the media access method and provides a unique identifier for the network card. a. MAC c. RPC b. LLC d. CRC ____ 19. A(n) ____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network card during production. a. CRC c. LLC b. RPC d. MAC ____ 20. Because the MAC address is added during the manufacturing process, it is a permanent marking. For this reason, the address is also known as a ____. a. NIC c. CRC b. BIA d. CSMA/CD ____ 21. The protocols at the Network layer allow computers to route packets to remote networks using a ____ address. a. burned in c. logical b. BIA d. physical ____ 22. ____ protocols, such as TCP, require an acknowledgment (ACK) of the receipt of data packets. a. Connectionless c. Application-layer b. SYN d. Connection-oriented ____ 23. ____ protocols, such as User Datagram Protocol (UDP), do not require an ACK. a. Presentation-layer c. Connectionless b. Connection-oriented d. Network-layer ____ 24. Data sent by a connectionless transport is called a ____. a. block c. cell b. datagram d. package
  • 3. ____ 25. Each layer in a protocol stack may add a(n) ____ to the data as it is passed down the layers. a. PDU c. CRC b. MTU d. LLC ____ 26. A(n) ____, which is also known as a header or a trailer, is specific information that is sent from one layer on the source computer to the same layer on the destination computer. a. LLC c. PDU b. MTU d. CRC Completion Complete each statement. 27. The term computer network, or simply ____________________, refers to the connection of two or more computers by some type of medium. 28. In a client/server network, the ____________________ host the resources for the clients to use and provide security. 29. A(n) ____________________ is a device that allows a computer or other device to connect to a network through the media. 30. A(n) ____________________ is a network that uses a public communications infrastructure to facilitate private communication between a company LAN and remote employees. 31. As the layers pass the data through the protocol stack, the addition of a header and/or trailer is called ____________________. Matching Match each item with a statement below: a. EMI f. Networking software b. Infrared g. Protocol c. Peer-to-peer network h. OSI model d. NOS i. Repeaters e. Networking hardware ____ 32. term that describes all the physical components of a network ____ 33. a defined method for communicating between systems ____ 34. a wireless transmission media ____ 35. devices that boost the network signal ____ 36. allows communication, security, and distribution of data, files, and applications over a network ____ 37. frequently caused by nearby motors or fluorescent lighting ____ 38. the programs used to run a network ____ 39. when every computer on a network acts as both a client and a server
  • 4. ____ 40. developed as an industry standard for companies to use when developing network hardware and software to ensure complete compatibility Short Answer 41. Why do we use networks? 42. Describe various types of servers in a network. 43. What are virtual private networks? 44. What are the advantages of a layered networking model? 45. What are the responsibilities of the OSI model Physical layer? 46. What are the responsibilities of the OSI model Data Link layer? 47. What are the functions of the Network layer of the OSI model? 48. What are the responsibilities of the Transport layer of the OSI model? 49. What are the services provided by the Session layer of the OSI model? 50. What are the responsibilities of the Presentation layer of the OSI model