SlideShare a Scribd company logo
EXAMEN CISCO
CCNA 1 Chapter 1 v5 Exam Answers
Time limit: 00:58:37
1. Question
1. Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a
LAN? (Choose two.)
1. cellular
2. DSL
3. satellite
4. cable
5. dial-up telephone
2. Question
2. What type of network must a home user access in order to do online shopping?
1. a local area network
2. the Internet
3. an extranet
4. an intranet
3. Question
3. What are two functions of intermediary devices on a network? (Choose two.)
1. They are the primary source and providers of information and services to end devices.
2. They form the interface between the human network and the underlying communication
network.
3. They direct data along alternate pathways when there is a link failure.
4. They run applications that support collaboration for business.
5. They filter the flow of data, based on security settings.
4. Question
4. Fill in the blank.
1. The acronym refers to the trend of end users being able to use their personal
devices to access the business network and resources.
5. Question
5. Which description correctly defines a converged network?
1. a network that allows users to interact directly with each other over multiple channels
2. a network that is limited to exchanging character-based information
3. a dedicated network with separate channels for video and voice services
4. a single network channel capable of delivering multiple communication forms
6. Question
6. Drag and drop
Match each characteristic to its corresponding internet conectivity type.
Sort elements
1. splits the access line into three signals
2. typically has very low bandwidth
3. Not suited for heavily wooded areas
4. uses coaxial cable as a medium
satellite
dialup telephone
DSL
cable
7. 7. Question
7.
Drag and drop
Match the form of network communication with its description.
Sort elements
1. wiki
2. Social media
3. instant messaging
4. podcast
Web pages that
groups of people can
edit and view
together
Interactive websites
where people created
and share user-
generated content
with friends and
family
real-time
communication of
between two or more
people
an audio-based
medium that allows
people to deliver their
recordings to a wide
audience
8. Question
8. Drag and drop
Match each definition to the corresponding security goal:
Sort elements
1. the assurance that the information has not been altered during transmission
2. the assurance of timely and reliable access to data
3. only the intended recipients can access and read the data
maintaining integrity
ensuring
confidentiality
ensuring availability
9. Question
9. Which statement describes a characteristic of cloud computing?
1. A business can connect directly to the Internet without the use of an ISP.
2. Devices can connect to the Internet through existing electrical wiring.
3. Investment in new infrastructure is required in order to access the cloud.
4. Applications can be accessed over the Internet through a subscription.
10. Question
10. Which two Internet connection options do not require that physical cables be run to the building?
(Choose two.)
1. cellular
2. dialup
3. satellite
4. DSL
5. dedicated leased line
11. Question
11. What is a characteristic of circuit-switched networks?
1. A single message can be broken into multiple message blocks that are transmitted through
multiple circuits simultaneously.
2. If all circuits are busy, a new call cannot be placed.
3. If a circuit fails, the call will be forwarded on a new path.
4. Circuit-switched networks can dynamically learn and use redundant circuits.
12. Question
12. Requiring strong, complex passwords is a practice that supports which network security goal?
1. maintaining communication integrity
2. ensuring redundancy
3. ensuring data confidentiality
4. ensuring reliability of access
13. Question
13. What two criteria are used to help select network media? (Choose two.)
1. the distance the media can successfully carry a signal
2. the environment where the media is to be installed
3. the cost of the end devices utilized in the network
4. the number of intermediary devices installed in the network
5. the types of data that need to be prioritized
14. Question
14. Which statement describes a network that supports QoS?
1. Data sent over the network is not altered in transmission.
2. The fewest possible devices are affected by a failure.
3. The network provides predictable levels of service to different types of traffic.
4. The network should be able to expand to keep up with user demand.
15. Question
Refer to the exhibit. Which set of devices contains only intermediary devices?
1. A, B, E, F
2. A, B, D, G
3. G, H, I, J
4. C, D, G, I
16. Question
16. Which device performs the function of determining the path that messages should take through
internetworks?
1. a web server
2. a DSL modem
3. a router
4. a firewall
17. Question
17. Which tool provides real-time video and audio communication over the Internet so that businesses
can conduct corporate meetings with participants from several remote locations?
1. wiki
2. instant messaging
3. weblog
4. TelePresence
18. Question
18. Which two statements about the relationship between LANs and WANs are true? (Choose two.)
1. Both LANs and WANs connect end devices. .
2. WANs are typically operated through multiple ISPs, but LANs are typically operated by
single organizations or individuals.
3. WANs connect LANs at slower speed bandwidth than LANs connect their internal end
devices.
4. The Internet is a WAN.
5. WANs must be publicly-owned, but LANs can be owned by either public or private entities
19. Question
19. Which three network tools provide the minimum required security protection for home users?
(Choose three.)
1. antivirus software
2. antispyware software
3. an intrusion prevention system
4. powerline networking
5. a firewall
6. access control lists
20. Question
20. Which area of the network would a college IT staff most likely have to redesign as a direct result of
many students bringing their own tablets and smartphones to school to access school resources?
1. intranet
2. wired LAN
3. wireless LAN
4. extranet
5. wireless WAN
21. Question
21. Which expression accurately defines the term congestion?
1. a method of limiting the impact of a hardware or software failure on the network
2. a set of techniques to manage the utilization of network resources
3. a state where the demand on the network resources exceeds the available capacity
4. a measure of the data carrying capacity of the network
22. Question
What two criteria are used to help select a network medium from various network media? (Choose
two.)
1. the types of data that need to be prioritized
2. the cost of the end devices utilized in the network
3. the number of intermediary devices installed in the network
4. the environment where the selected medium is to be installed
5. the distance the selected medium can successfully carry a signal
23. Question
23. Which term describes the state of a network when the demand on the network resources exceeds
the available capacity?
1. optimization
2. congestion
3. convergence
4. synchronization

More Related Content

What's hot

Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms Internet
IRJET Journal
 
Paper id 71201996
Paper id 71201996Paper id 71201996
Paper id 71201996
IJRAT
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
Sharonp15
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
IJECEIAES
 
Synopsis
SynopsisSynopsis
Synopsis
Kak Yong
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
Thamalsha Wijayarathna
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area network
IAEME Publication
 

What's hot (7)

Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms Internet
 
Paper id 71201996
Paper id 71201996Paper id 71201996
Paper id 71201996
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
 
Synopsis
SynopsisSynopsis
Synopsis
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area network
 

Viewers also liked

Inventario de redes veronica & yesica cañaveral angel
Inventario de redes veronica & yesica cañaveral angelInventario de redes veronica & yesica cañaveral angel
Inventario de redes veronica & yesica cañaveral angel
Once Redes
 
Sara muñoz (1)
Sara muñoz (1)Sara muñoz (1)
Sara muñoz (1)
Once Redes
 
Ejercicio de subredes laura garcia
Ejercicio de subredes laura garciaEjercicio de subredes laura garcia
Ejercicio de subredes laura garcia
Once Redes
 
Taller
Taller  Taller
Taller
Once Redes
 
Lenguajes de programacion torres montoya
Lenguajes de programacion torres montoyaLenguajes de programacion torres montoya
Lenguajes de programacion torres montoya
Once Redes
 
Examen cisco mariana
Examen cisco marianaExamen cisco mariana
Examen cisco mariana
Once Redes
 
Manual de usuario isabel macias
Manual de usuario isabel maciasManual de usuario isabel macias
Manual de usuario isabel macias
Once Redes
 
Ejercicio subredes camila loaiza
Ejercicio subredes camila loaizaEjercicio subredes camila loaiza
Ejercicio subredes camila loaiza
Once Redes
 
Inventario de redes mariana puerta
Inventario de redes mariana puertaInventario de redes mariana puerta
Inventario de redes mariana puerta
Once Redes
 
Valentina torres taller de induccion
Valentina torres taller de induccionValentina torres taller de induccion
Valentina torres taller de induccion
Once Redes
 
Montaje de red laura garcia
Montaje de red laura garciaMontaje de red laura garcia
Montaje de red laura garcia
Once Redes
 
Configuracion de router yesica cañaveral angel
Configuracion de router    yesica cañaveral angelConfiguracion de router    yesica cañaveral angel
Configuracion de router yesica cañaveral angel
Once Redes
 
Laboratorio conexion 2 pc
Laboratorio conexion 2 pc Laboratorio conexion 2 pc
Laboratorio conexion 2 pc
Once Redes
 
Taller de redes valentina suarez
Taller de redes valentina suarezTaller de redes valentina suarez
Taller de redes valentina suarez
Once Redes
 
Taller valeria loaiza zuleta y eliana galeano
Taller  valeria loaiza zuleta y eliana galeanoTaller  valeria loaiza zuleta y eliana galeano
Taller valeria loaiza zuleta y eliana galeano
Once Redes
 
inventario de equipos.
inventario de equipos.inventario de equipos.
inventario de equipos.
Once Redes
 
Web quest seguridad informática laura garcia
Web quest seguridad informática laura garcia Web quest seguridad informática laura garcia
Web quest seguridad informática laura garcia
Once Redes
 

Viewers also liked (17)

Inventario de redes veronica & yesica cañaveral angel
Inventario de redes veronica & yesica cañaveral angelInventario de redes veronica & yesica cañaveral angel
Inventario de redes veronica & yesica cañaveral angel
 
Sara muñoz (1)
Sara muñoz (1)Sara muñoz (1)
Sara muñoz (1)
 
Ejercicio de subredes laura garcia
Ejercicio de subredes laura garciaEjercicio de subredes laura garcia
Ejercicio de subredes laura garcia
 
Taller
Taller  Taller
Taller
 
Lenguajes de programacion torres montoya
Lenguajes de programacion torres montoyaLenguajes de programacion torres montoya
Lenguajes de programacion torres montoya
 
Examen cisco mariana
Examen cisco marianaExamen cisco mariana
Examen cisco mariana
 
Manual de usuario isabel macias
Manual de usuario isabel maciasManual de usuario isabel macias
Manual de usuario isabel macias
 
Ejercicio subredes camila loaiza
Ejercicio subredes camila loaizaEjercicio subredes camila loaiza
Ejercicio subredes camila loaiza
 
Inventario de redes mariana puerta
Inventario de redes mariana puertaInventario de redes mariana puerta
Inventario de redes mariana puerta
 
Valentina torres taller de induccion
Valentina torres taller de induccionValentina torres taller de induccion
Valentina torres taller de induccion
 
Montaje de red laura garcia
Montaje de red laura garciaMontaje de red laura garcia
Montaje de red laura garcia
 
Configuracion de router yesica cañaveral angel
Configuracion de router    yesica cañaveral angelConfiguracion de router    yesica cañaveral angel
Configuracion de router yesica cañaveral angel
 
Laboratorio conexion 2 pc
Laboratorio conexion 2 pc Laboratorio conexion 2 pc
Laboratorio conexion 2 pc
 
Taller de redes valentina suarez
Taller de redes valentina suarezTaller de redes valentina suarez
Taller de redes valentina suarez
 
Taller valeria loaiza zuleta y eliana galeano
Taller  valeria loaiza zuleta y eliana galeanoTaller  valeria loaiza zuleta y eliana galeano
Taller valeria loaiza zuleta y eliana galeano
 
inventario de equipos.
inventario de equipos.inventario de equipos.
inventario de equipos.
 
Web quest seguridad informática laura garcia
Web quest seguridad informática laura garcia Web quest seguridad informática laura garcia
Web quest seguridad informática laura garcia
 

Similar to Examen cisco Maria Alejandra Torres

Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5
atom1716
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
Alithea Barbosa
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN BASHA
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Đồng Quốc Vương
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
Miz Malinz
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
Nik Ainy
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internet
Fatin Izzaty
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Editor IJCATR
 
Module 1 : Introduction to Internet
Module 1 : Introduction to Internet Module 1 : Introduction to Internet
Module 1 : Introduction to Internet
Intelliengent Network I.T
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
airiel hamka
 
Module Internet
Module Internet Module Internet
Module Internet
airiel hamka
 
Module 201 intro 20 internet
Module 201 intro 20 internetModule 201 intro 20 internet
Module 201 intro 20 internet
Nick Racers
 
Module Introduction
Module IntroductionModule Introduction
Module Introduction
Ira Raji
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
Eswar Publications
 
Mod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdfMod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdf
GlennNarcanaMicarand
 
networking concepts
networking conceptsnetworking concepts
networking concepts
mtguillermo
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
Nur Azlina
 

Similar to Examen cisco Maria Alejandra Torres (20)

Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internet
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Module 1 : Introduction to Internet
Module 1 : Introduction to Internet Module 1 : Introduction to Internet
Module 1 : Introduction to Internet
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
 
Module Internet
Module Internet Module Internet
Module Internet
 
Module 201 intro 20 internet
Module 201 intro 20 internetModule 201 intro 20 internet
Module 201 intro 20 internet
 
Module Introduction
Module IntroductionModule Introduction
Module Introduction
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
 
Mod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdfMod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdf
 
networking concepts
networking conceptsnetworking concepts
networking concepts
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 

More from Once Redes

Formato proyecto-productivo media-técnica-medellin-digital
Formato proyecto-productivo media-técnica-medellin-digitalFormato proyecto-productivo media-técnica-medellin-digital
Formato proyecto-productivo media-técnica-medellin-digital
Once Redes
 
Como ser un emprendedor
Como ser un emprendedorComo ser un emprendedor
Como ser un emprendedor
Once Redes
 
Que es criptografia mariana puerta
Que es criptografia mariana puertaQue es criptografia mariana puerta
Que es criptografia mariana puerta
Once Redes
 
Tarea mariana puerta
Tarea mariana puerta Tarea mariana puerta
Tarea mariana puerta
Once Redes
 
Redes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahitaRedes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahita
Once Redes
 
Taller de induccion mariana puerta
Taller de induccion mariana puertaTaller de induccion mariana puerta
Taller de induccion mariana puerta
Once Redes
 
Lenguajes de programación mariana puerta
Lenguajes de programación mariana puertaLenguajes de programación mariana puerta
Lenguajes de programación mariana puerta
Once Redes
 
Maquinas virtuales mariana puerta
Maquinas virtuales mariana puertaMaquinas virtuales mariana puerta
Maquinas virtuales mariana puerta
Once Redes
 
Sara muñoz alejandra zabala
Sara muñoz  alejandra zabalaSara muñoz  alejandra zabala
Sara muñoz alejandra zabala
Once Redes
 
Alejandra zabala (2)
Alejandra zabala (2)Alejandra zabala (2)
Alejandra zabala (2)
Once Redes
 
Configuracion del rou ter mariana puerta
Configuracion del rou ter mariana puertaConfiguracion del rou ter mariana puerta
Configuracion del rou ter mariana puerta
Once Redes
 
Alejandra zabala (1)
Alejandra zabala (1)Alejandra zabala (1)
Alejandra zabala (1)
Once Redes
 
Web quest seguridad informática sara muñoz alejandra zabala
Web quest seguridad informática sara muñoz   alejandra zabalaWeb quest seguridad informática sara muñoz   alejandra zabala
Web quest seguridad informática sara muñoz alejandra zabala
Once Redes
 
Redes wan alejandra zabala
Redes wan  alejandra zabala Redes wan  alejandra zabala
Redes wan alejandra zabala
Once Redes
 
Alejandra zabala
Alejandra zabalaAlejandra zabala
Alejandra zabala
Once Redes
 
Taller de induccion a las redes isabel macias
 Taller de induccion a las redes isabel macias Taller de induccion a las redes isabel macias
Taller de induccion a las redes isabel macias
Once Redes
 
Redes wan alysson villamil
Redes wan alysson villamil  Redes wan alysson villamil
Redes wan alysson villamil
Once Redes
 
Criptografia
Criptografia Criptografia
Criptografia
Once Redes
 
Lista de chequeo mariana puerta
Lista de chequeo mariana puertaLista de chequeo mariana puerta
Lista de chequeo mariana puerta
Once Redes
 
Alysson Villamil
Alysson Villamil Alysson Villamil
Alysson Villamil
Once Redes
 

More from Once Redes (20)

Formato proyecto-productivo media-técnica-medellin-digital
Formato proyecto-productivo media-técnica-medellin-digitalFormato proyecto-productivo media-técnica-medellin-digital
Formato proyecto-productivo media-técnica-medellin-digital
 
Como ser un emprendedor
Como ser un emprendedorComo ser un emprendedor
Como ser un emprendedor
 
Que es criptografia mariana puerta
Que es criptografia mariana puertaQue es criptografia mariana puerta
Que es criptografia mariana puerta
 
Tarea mariana puerta
Tarea mariana puerta Tarea mariana puerta
Tarea mariana puerta
 
Redes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahitaRedes wan mariana puerta piedrahita
Redes wan mariana puerta piedrahita
 
Taller de induccion mariana puerta
Taller de induccion mariana puertaTaller de induccion mariana puerta
Taller de induccion mariana puerta
 
Lenguajes de programación mariana puerta
Lenguajes de programación mariana puertaLenguajes de programación mariana puerta
Lenguajes de programación mariana puerta
 
Maquinas virtuales mariana puerta
Maquinas virtuales mariana puertaMaquinas virtuales mariana puerta
Maquinas virtuales mariana puerta
 
Sara muñoz alejandra zabala
Sara muñoz  alejandra zabalaSara muñoz  alejandra zabala
Sara muñoz alejandra zabala
 
Alejandra zabala (2)
Alejandra zabala (2)Alejandra zabala (2)
Alejandra zabala (2)
 
Configuracion del rou ter mariana puerta
Configuracion del rou ter mariana puertaConfiguracion del rou ter mariana puerta
Configuracion del rou ter mariana puerta
 
Alejandra zabala (1)
Alejandra zabala (1)Alejandra zabala (1)
Alejandra zabala (1)
 
Web quest seguridad informática sara muñoz alejandra zabala
Web quest seguridad informática sara muñoz   alejandra zabalaWeb quest seguridad informática sara muñoz   alejandra zabala
Web quest seguridad informática sara muñoz alejandra zabala
 
Redes wan alejandra zabala
Redes wan  alejandra zabala Redes wan  alejandra zabala
Redes wan alejandra zabala
 
Alejandra zabala
Alejandra zabalaAlejandra zabala
Alejandra zabala
 
Taller de induccion a las redes isabel macias
 Taller de induccion a las redes isabel macias Taller de induccion a las redes isabel macias
Taller de induccion a las redes isabel macias
 
Redes wan alysson villamil
Redes wan alysson villamil  Redes wan alysson villamil
Redes wan alysson villamil
 
Criptografia
Criptografia Criptografia
Criptografia
 
Lista de chequeo mariana puerta
Lista de chequeo mariana puertaLista de chequeo mariana puerta
Lista de chequeo mariana puerta
 
Alysson Villamil
Alysson Villamil Alysson Villamil
Alysson Villamil
 

Recently uploaded

cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 

Recently uploaded (12)

cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 

Examen cisco Maria Alejandra Torres

  • 1. EXAMEN CISCO CCNA 1 Chapter 1 v5 Exam Answers Time limit: 00:58:37 1. Question 1. Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.) 1. cellular 2. DSL 3. satellite 4. cable 5. dial-up telephone 2. Question 2. What type of network must a home user access in order to do online shopping? 1. a local area network 2. the Internet 3. an extranet 4. an intranet
  • 2. 3. Question 3. What are two functions of intermediary devices on a network? (Choose two.) 1. They are the primary source and providers of information and services to end devices. 2. They form the interface between the human network and the underlying communication network. 3. They direct data along alternate pathways when there is a link failure. 4. They run applications that support collaboration for business. 5. They filter the flow of data, based on security settings. 4. Question 4. Fill in the blank. 1. The acronym refers to the trend of end users being able to use their personal devices to access the business network and resources. 5. Question 5. Which description correctly defines a converged network? 1. a network that allows users to interact directly with each other over multiple channels 2. a network that is limited to exchanging character-based information 3. a dedicated network with separate channels for video and voice services
  • 3. 4. a single network channel capable of delivering multiple communication forms 6. Question 6. Drag and drop Match each characteristic to its corresponding internet conectivity type. Sort elements 1. splits the access line into three signals 2. typically has very low bandwidth 3. Not suited for heavily wooded areas 4. uses coaxial cable as a medium satellite dialup telephone DSL cable 7. 7. Question 7. Drag and drop Match the form of network communication with its description.
  • 4. Sort elements 1. wiki 2. Social media 3. instant messaging 4. podcast Web pages that groups of people can edit and view together Interactive websites where people created and share user- generated content with friends and family real-time communication of between two or more people an audio-based medium that allows people to deliver their recordings to a wide
  • 5. audience 8. Question 8. Drag and drop Match each definition to the corresponding security goal: Sort elements 1. the assurance that the information has not been altered during transmission 2. the assurance of timely and reliable access to data 3. only the intended recipients can access and read the data maintaining integrity ensuring confidentiality ensuring availability 9. Question 9. Which statement describes a characteristic of cloud computing? 1. A business can connect directly to the Internet without the use of an ISP. 2. Devices can connect to the Internet through existing electrical wiring.
  • 6. 3. Investment in new infrastructure is required in order to access the cloud. 4. Applications can be accessed over the Internet through a subscription. 10. Question 10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) 1. cellular 2. dialup 3. satellite 4. DSL 5. dedicated leased line 11. Question 11. What is a characteristic of circuit-switched networks? 1. A single message can be broken into multiple message blocks that are transmitted through multiple circuits simultaneously. 2. If all circuits are busy, a new call cannot be placed. 3. If a circuit fails, the call will be forwarded on a new path.
  • 7. 4. Circuit-switched networks can dynamically learn and use redundant circuits. 12. Question 12. Requiring strong, complex passwords is a practice that supports which network security goal? 1. maintaining communication integrity 2. ensuring redundancy 3. ensuring data confidentiality 4. ensuring reliability of access 13. Question 13. What two criteria are used to help select network media? (Choose two.) 1. the distance the media can successfully carry a signal 2. the environment where the media is to be installed 3. the cost of the end devices utilized in the network 4. the number of intermediary devices installed in the network 5. the types of data that need to be prioritized 14. Question 14. Which statement describes a network that supports QoS?
  • 8. 1. Data sent over the network is not altered in transmission. 2. The fewest possible devices are affected by a failure. 3. The network provides predictable levels of service to different types of traffic. 4. The network should be able to expand to keep up with user demand. 15. Question Refer to the exhibit. Which set of devices contains only intermediary devices? 1. A, B, E, F 2. A, B, D, G
  • 9. 3. G, H, I, J 4. C, D, G, I 16. Question 16. Which device performs the function of determining the path that messages should take through internetworks? 1. a web server 2. a DSL modem 3. a router 4. a firewall 17. Question 17. Which tool provides real-time video and audio communication over the Internet so that businesses can conduct corporate meetings with participants from several remote locations? 1. wiki 2. instant messaging 3. weblog 4. TelePresence 18. Question
  • 10. 18. Which two statements about the relationship between LANs and WANs are true? (Choose two.) 1. Both LANs and WANs connect end devices. . 2. WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals. 3. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices. 4. The Internet is a WAN. 5. WANs must be publicly-owned, but LANs can be owned by either public or private entities 19. Question 19. Which three network tools provide the minimum required security protection for home users? (Choose three.) 1. antivirus software 2. antispyware software 3. an intrusion prevention system 4. powerline networking 5. a firewall
  • 11. 6. access control lists 20. Question 20. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? 1. intranet 2. wired LAN 3. wireless LAN 4. extranet 5. wireless WAN 21. Question 21. Which expression accurately defines the term congestion? 1. a method of limiting the impact of a hardware or software failure on the network 2. a set of techniques to manage the utilization of network resources 3. a state where the demand on the network resources exceeds the available capacity 4. a measure of the data carrying capacity of the network 22. Question
  • 12. What two criteria are used to help select a network medium from various network media? (Choose two.) 1. the types of data that need to be prioritized 2. the cost of the end devices utilized in the network 3. the number of intermediary devices installed in the network 4. the environment where the selected medium is to be installed 5. the distance the selected medium can successfully carry a signal 23. Question 23. Which term describes the state of a network when the demand on the network resources exceeds the available capacity? 1. optimization 2. congestion 3. convergence 4. synchronization