SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Chapter 1

True/False
Indicate whether the statement is true or false.

____    1. Two computers connected by a wire cable form a network.

____    2. In 1954, the International Organization for Standardization (ISO) presented the Open Systems Interconnection
           (OSI) model.

____    3. Computers must use a common protocol to communicate properly.

____    4. Peer communication allows error checking to occur on two separate layers simultaneously.

____    5. Many LANs and WANs contain several segments. Dividing a network into segments reduces performance.


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    6. The term ____ refers to the wire cabling, such as coaxial or the more commonly used twisted-pair, that form
           the connections in most networks.
           a. media                                        c. server
           b. EMI                                          d. node

____    7. ____ networks have computers that are servers and computers that act as clients to those servers.
           a. EMI                                         c. Peer-to-node
           b. Peer-to-peer                                d. Client/server
____    8. A ____ is contained within a company or department and located in a single geographic area, usually a
           building or part of a building.
           a. WAN                                        c. SAN
           b. LAN                                        d. MAN
____    9. A ____ spans multiple geographic areas and is usually connected by common telecommunication carriers.
           a. LAN                                         c. WAN
           b. SAN                                         d. MAN
____ 10. The term ____ refers to the intermediate stage between a LAN and a WAN.
         a. SAN                                          c. WAN
         b. LAN                                          d. MAN
____ 11. The term ____ refers to a series of storage devices, such as tapes, hard drives, and CDs, that are networked
         together to provide very fast data storage for a network or subnetwork.
         a. MAN                                            c. SAN
         b. WAN                                            d. LAN
____ 12. The part of the company’s network that allows access to nonemployees is called the ____, which is accessed
         over or through the Internet.
         a. intranet                                    c. publicnet
         b. extranet                                    d. privatenet
____ 13. The part of the company’s network that allows access to employees is called the ____, which is completely
         separate from the Internet.
         a. intranet                                    c. SAN
         b. LAN                                         d. extranet
____ 14. The seven layers of the OSI reference model communicate with one another via ____ communication.
         a. multicast                                  c. peer
         b. logical                                    d. unicast

____ 15. The OSI model ____ layer defines the mechanical, electrical, and procedural events that occur during the
         physical transmission of electronic signals on the wire.
         a. Physical                                      c. Data Link
         b. Transport                                     d. Network

____ 16. The ____ is information that is used to determine whether data was corrupted during transmission.
         a. LLC                                          c. MAC
         b. CRC                                          d. RPC
____ 17. The ____ sublayer of the Data Link layer defines how data is packaged for the network.
         a. MAC                                         c. CRC
         b. RPC                                         d. LLC
____ 18. The ____ sublayer of the Data Link layer defines the media access method and provides a unique identifier
         for the network card.
         a. MAC                                         c. RPC
         b. LLC                                         d. CRC
____ 19. A(n) ____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network
         card during production.
         a. CRC                                          c. LLC
         b. RPC                                          d. MAC
____ 20. Because the MAC address is added during the manufacturing process, it is a permanent marking. For this
         reason, the address is also known as a ____.
         a. NIC                                       c. CRC
         b. BIA                                       d. CSMA/CD
____ 21. The protocols at the Network layer allow computers to route packets to remote networks using a ____
         address.
         a. burned in                                  c. logical
         b. BIA                                        d. physical
____ 22. ____ protocols, such as TCP, require an acknowledgment (ACK) of the receipt of data packets.
         a. Connectionless                             c. Application-layer
         b. SYN                                        d. Connection-oriented
____ 23. ____ protocols, such as User Datagram Protocol (UDP), do not require an ACK.
         a. Presentation-layer                         c. Connectionless
         b. Connection-oriented                        d. Network-layer
____ 24. Data sent by a connectionless transport is called a ____.
         a. block                                         c. cell
         b. datagram                                      d. package
____ 25. Each layer in a protocol stack may add a(n) ____ to the data as it is passed down the layers.
         a. PDU                                         c. CRC
         b. MTU                                         d. LLC

____ 26. A(n) ____, which is also known as a header or a trailer, is specific information that is sent from one layer on
         the source computer to the same layer on the destination computer.
         a. LLC                                          c. PDU
         b. MTU                                          d. CRC


Completion
Complete each statement.

       27. The term computer network, or simply ____________________, refers to the connection of two or more
           computers by some type of medium.

       28. In a client/server network, the ____________________ host the resources for the clients to use and provide
           security.

       29. A(n) ____________________ is a device that allows a computer or other device to connect to a network
           through the media.

       30. A(n) ____________________ is a network that uses a public communications infrastructure to facilitate
           private communication between a company LAN and remote employees.

       31. As the layers pass the data through the protocol stack, the addition of a header and/or trailer is called
           ____________________.


Matching

            Match each item with a statement below:
            a. EMI                                           f.   Networking software
            b. Infrared                                      g.   Protocol
            c. Peer-to-peer network                          h.   OSI model
            d. NOS                                           i.   Repeaters
            e. Networking hardware
____ 32. term that describes all the physical components of a network
____ 33. a defined method for communicating between systems
____ 34. a wireless transmission media
____ 35. devices that boost the network signal
____ 36. allows communication, security, and distribution of data, files, and applications over a network
____ 37. frequently caused by nearby motors or fluorescent lighting
____ 38. the programs used to run a network
____ 39. when every computer on a network acts as both a client and a server
____ 40. developed as an industry standard for companies to use when developing network hardware and software to
         ensure complete compatibility


Short Answer

      41. Why do we use networks?

      42. Describe various types of servers in a network.

      43. What are virtual private networks?

      44. What are the advantages of a layered networking model?

      45. What are the responsibilities of the OSI model Physical layer?

      46. What are the responsibilities of the OSI model Data Link layer?

      47. What are the functions of the Network layer of the OSI model?

      48. What are the responsibilities of the Transport layer of the OSI model?

      49. What are the services provided by the Session layer of the OSI model?

      50. What are the responsibilities of the Presentation layer of the OSI model

Contenu connexe

Tendances

Ccna 1 final exam answer v5
Ccna 1 final exam answer v5Ccna 1 final exam answer v5
Ccna 1 final exam answer v5
friv4schoolgames
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
Swapnil Raut
 
008 stp principle issue1.3bx1
008 stp principle issue1.3bx1008 stp principle issue1.3bx1
008 stp principle issue1.3bx1
jcbp_peru
 

Tendances (20)

Mcq in int
Mcq in intMcq in int
Mcq in int
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
 
Ch22
Ch22Ch22
Ch22
 
computer communication networks MCQs
 computer communication networks MCQs   computer communication networks MCQs
computer communication networks MCQs
 
CN_Lec 5_OSI
CN_Lec 5_OSICN_Lec 5_OSI
CN_Lec 5_OSI
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Routing and switching question1
Routing and switching question1Routing and switching question1
Routing and switching question1
 
Multicast address
Multicast addressMulticast address
Multicast address
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomain
 
01 Introduction (CN)
01 Introduction (CN)01 Introduction (CN)
01 Introduction (CN)
 
Ccna 1 final exam answer v5
Ccna 1 final exam answer v5Ccna 1 final exam answer v5
Ccna 1 final exam answer v5
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
 
008 stp principle issue1.3bx1
008 stp principle issue1.3bx1008 stp principle issue1.3bx1
008 stp principle issue1.3bx1
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 

En vedette

Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheet
aromal4frnz
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
Dsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
Dsunte Wilson
 
Computer services
Computer servicesComputer services
Computer services
Arz Sy
 

En vedette (16)

Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheet
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 
Cisco CCNA module 2
Cisco CCNA module 2Cisco CCNA module 2
Cisco CCNA module 2
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
Computer services
Computer servicesComputer services
Computer services
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
 

Similaire à CCNA Introducing Networks Questions

CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
Dsunte Wilson
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
bunyansaturnina
 
Eidws 108 networks
Eidws 108 networksEidws 108 networks
Eidws 108 networks
IT2Alcorn
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
Dsunte Wilson
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
JeanmarieColbert3
 
資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)
逸 張
 
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
wondimagegndesta
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
Dsunte Wilson
 

Similaire à CCNA Introducing Networks Questions (20)

CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
 
Mcq for final
Mcq for finalMcq for final
Mcq for final
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Ans.tutorial#2
Ans.tutorial#2Ans.tutorial#2
Ans.tutorial#2
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
Eidws 108 networks
Eidws 108 networksEidws 108 networks
Eidws 108 networks
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
 
資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)
 
[Mcq] computer communication networks lmt2
[Mcq] computer communication networks   lmt2[Mcq] computer communication networks   lmt2
[Mcq] computer communication networks lmt2
 
exam2
exam2exam2
exam2
 
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
 
indroduction of rain technology
indroduction of rain technologyindroduction of rain technology
indroduction of rain technology
 
Set2 ict-question
Set2 ict-questionSet2 ict-question
Set2 ict-question
 
Computer Network Theory Part 4
Computer Network Theory Part 4Computer Network Theory Part 4
Computer Network Theory Part 4
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
 
FP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QFP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL Q
 

Plus de Dsunte Wilson

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
Dsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
Dsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
Dsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
Dsunte Wilson
 

Plus de Dsunte Wilson (16)

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

CCNA Introducing Networks Questions

  • 1. Chapter 1 True/False Indicate whether the statement is true or false. ____ 1. Two computers connected by a wire cable form a network. ____ 2. In 1954, the International Organization for Standardization (ISO) presented the Open Systems Interconnection (OSI) model. ____ 3. Computers must use a common protocol to communicate properly. ____ 4. Peer communication allows error checking to occur on two separate layers simultaneously. ____ 5. Many LANs and WANs contain several segments. Dividing a network into segments reduces performance. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. The term ____ refers to the wire cabling, such as coaxial or the more commonly used twisted-pair, that form the connections in most networks. a. media c. server b. EMI d. node ____ 7. ____ networks have computers that are servers and computers that act as clients to those servers. a. EMI c. Peer-to-node b. Peer-to-peer d. Client/server ____ 8. A ____ is contained within a company or department and located in a single geographic area, usually a building or part of a building. a. WAN c. SAN b. LAN d. MAN ____ 9. A ____ spans multiple geographic areas and is usually connected by common telecommunication carriers. a. LAN c. WAN b. SAN d. MAN ____ 10. The term ____ refers to the intermediate stage between a LAN and a WAN. a. SAN c. WAN b. LAN d. MAN ____ 11. The term ____ refers to a series of storage devices, such as tapes, hard drives, and CDs, that are networked together to provide very fast data storage for a network or subnetwork. a. MAN c. SAN b. WAN d. LAN ____ 12. The part of the company’s network that allows access to nonemployees is called the ____, which is accessed over or through the Internet. a. intranet c. publicnet b. extranet d. privatenet
  • 2. ____ 13. The part of the company’s network that allows access to employees is called the ____, which is completely separate from the Internet. a. intranet c. SAN b. LAN d. extranet ____ 14. The seven layers of the OSI reference model communicate with one another via ____ communication. a. multicast c. peer b. logical d. unicast ____ 15. The OSI model ____ layer defines the mechanical, electrical, and procedural events that occur during the physical transmission of electronic signals on the wire. a. Physical c. Data Link b. Transport d. Network ____ 16. The ____ is information that is used to determine whether data was corrupted during transmission. a. LLC c. MAC b. CRC d. RPC ____ 17. The ____ sublayer of the Data Link layer defines how data is packaged for the network. a. MAC c. CRC b. RPC d. LLC ____ 18. The ____ sublayer of the Data Link layer defines the media access method and provides a unique identifier for the network card. a. MAC c. RPC b. LLC d. CRC ____ 19. A(n) ____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network card during production. a. CRC c. LLC b. RPC d. MAC ____ 20. Because the MAC address is added during the manufacturing process, it is a permanent marking. For this reason, the address is also known as a ____. a. NIC c. CRC b. BIA d. CSMA/CD ____ 21. The protocols at the Network layer allow computers to route packets to remote networks using a ____ address. a. burned in c. logical b. BIA d. physical ____ 22. ____ protocols, such as TCP, require an acknowledgment (ACK) of the receipt of data packets. a. Connectionless c. Application-layer b. SYN d. Connection-oriented ____ 23. ____ protocols, such as User Datagram Protocol (UDP), do not require an ACK. a. Presentation-layer c. Connectionless b. Connection-oriented d. Network-layer ____ 24. Data sent by a connectionless transport is called a ____. a. block c. cell b. datagram d. package
  • 3. ____ 25. Each layer in a protocol stack may add a(n) ____ to the data as it is passed down the layers. a. PDU c. CRC b. MTU d. LLC ____ 26. A(n) ____, which is also known as a header or a trailer, is specific information that is sent from one layer on the source computer to the same layer on the destination computer. a. LLC c. PDU b. MTU d. CRC Completion Complete each statement. 27. The term computer network, or simply ____________________, refers to the connection of two or more computers by some type of medium. 28. In a client/server network, the ____________________ host the resources for the clients to use and provide security. 29. A(n) ____________________ is a device that allows a computer or other device to connect to a network through the media. 30. A(n) ____________________ is a network that uses a public communications infrastructure to facilitate private communication between a company LAN and remote employees. 31. As the layers pass the data through the protocol stack, the addition of a header and/or trailer is called ____________________. Matching Match each item with a statement below: a. EMI f. Networking software b. Infrared g. Protocol c. Peer-to-peer network h. OSI model d. NOS i. Repeaters e. Networking hardware ____ 32. term that describes all the physical components of a network ____ 33. a defined method for communicating between systems ____ 34. a wireless transmission media ____ 35. devices that boost the network signal ____ 36. allows communication, security, and distribution of data, files, and applications over a network ____ 37. frequently caused by nearby motors or fluorescent lighting ____ 38. the programs used to run a network ____ 39. when every computer on a network acts as both a client and a server
  • 4. ____ 40. developed as an industry standard for companies to use when developing network hardware and software to ensure complete compatibility Short Answer 41. Why do we use networks? 42. Describe various types of servers in a network. 43. What are virtual private networks? 44. What are the advantages of a layered networking model? 45. What are the responsibilities of the OSI model Physical layer? 46. What are the responsibilities of the OSI model Data Link layer? 47. What are the functions of the Network layer of the OSI model? 48. What are the responsibilities of the Transport layer of the OSI model? 49. What are the services provided by the Session layer of the OSI model? 50. What are the responsibilities of the Presentation layer of the OSI model