SlideShare a Scribd company logo
1 of 30
Cisco 1 - Networking Basics                                   Chapter 11




    At which layer of the TCP/IP model does Telnet operate?

             1.   application
             2.   presentation
             3.   session
             4.   transport
             5.   internet
             6.   network access




Perrine. J                            07/15/09                        Page 1
Cisco 1 - Networking Basics                                   Chapter 11




    At which layer of the TCP/IP model does Telnet operate?

             •   application
             •   presentation
             •   session
             •   transport
             •   internet
             •   network access




Perrine. J                            07/15/09                        Page 2
Cisco 1 - Networking Basics                                    Chapter 11




      Which of the following SNMP components would a router be considered?

             1.   network management system
             2.   agents
             3.   managed devices
             4.   secure ports




Perrine. J                             07/15/09                         Page 3
Cisco 1 - Networking Basics                                    Chapter 11




      Which of the following SNMP components would a router be considered?

             •   network management system
             •   agents
             •   managed devices
             •   secure ports




Perrine. J                            07/15/09                          Page 4
Cisco 1 - Networking Basics                                   Chapter 11




   Which SNMP component is responsible for using the majority of memory
   resources?

             1.   network management system
             2.   agents
             3.   managed devices
             4.   secure ports




Perrine. J                               07/15/09                         Page 5
Cisco 1 - Networking Basics                                   Chapter 11




   Which SNMP component is responsible for using the majority of memory
   resources?

             •   network management system
             •   agents
             •   managed devices
             •   secure ports




Perrine. J                            07/15/09                            Page 6
Cisco 1 - Networking Basics                                      Chapter 11




     Which protocol is used by e-mail servers to communicate with each other?

             1.   FTP
             2.   HTTP
             3.   TFTP
             4.   SMTP
             5.   POP
             6.   SNMP




Perrine. J                             07/15/09                           Page 7
Cisco 1 - Networking Basics                                      Chapter 11




     Which protocol is used by e-mail servers to communicate with each other?

             •   FTP
             •   HTTP
             •   TFTP
             •   SMTP
             •   POP
             •   SNMP




Perrine. J                             07/15/09                           Page 8
Cisco 1 - Networking Basics                                      Chapter 11




     Which part of the URL http://www.awsb.ca/teacher gives the name of the
     domain?

             1.   www
             2.   http://
             3.   /teacher
             4.   awsb.ca




Perrine. J                             07/15/09                           Page 9
Cisco 1 - Networking Basics                                      Chapter 11




     Which part of the URL http://www.awsb.ca/teacher gives the name of the
     domain?

             •   www
             •   http://
             •   /teacher
             •   awsb.ca




Perrine. J                             07/15/09                           Page 10
Cisco 1 - Networking Basics                                     Chapter 11




   Which of the following are disadvantages of using SMTP for e-mail servers?
   (Choose two.)

             1.   offers very little security
             2.   no authentication
             3.   strong reliability
             4.   does not work well with email servers




Perrine. J                                      07/15/09                  Page 11
Cisco 1 - Networking Basics                                     Chapter 11




   Which of the following are disadvantages of using SMTP for e-mail servers?
   (Choose two.)

             •   offers very little security
             •   no authentication
             •   strong reliability
             •   does not work well with email servers




Perrine. J                                     07/15/09                   Page 12
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following are components of SNMP? (Choose three.)

             1.   network management system
             2.   protocol analyzer
             3.   managed devices
             4.   secure ports
             5.   agents
             6.   protocol inspector




Perrine. J                              07/15/09                       Page 13
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following are components of SNMP? (Choose three.)

             •   network management system
             •   protocol analyzer
             •   managed devices
             •   secure ports
             •   agents
             •   protocol inspector




Perrine. J                            07/15/09                         Page 14
Cisco 1 - Networking Basics                                          Chapter 11




     Which of the following uses a connectionless protocol to transfer files?

             1.   FTP
             2.   TFTP
             3.   HTTP
             4.   SNMP




Perrine. J                               07/15/09                               Page 15
Cisco 1 - Networking Basics                                          Chapter 11




     Which of the following uses a connectionless protocol to transfer files?

             •   FTP
             •   TFTP
             •   HTTP
             •   SNMP




Perrine. J                               07/15/09                               Page 16
Cisco 1 - Networking Basics                                         Chapter 11




     Which type of institution does the domain suffix .org represent?

             1.   government
             2.   education
             3.   network
             4.   non-profit




Perrine. J                               07/15/09                           Page 17
Cisco 1 - Networking Basics                                         Chapter 11




     Which type of institution does the domain suffix .org represent?

             •   government
             •   education
             •   network
             •   non-profit




Perrine. J                               07/15/09                           Page 18
Cisco 1 - Networking Basics                                          Chapter 11




      Which protocol is used by FTP to transfer files over the Internet?

             1.   TCP
             2.   SMTP
             3.   UDP
             4.   SNMP




Perrine. J                               07/15/09                            Page 19
Cisco 1 - Networking Basics                                          Chapter 11




      Which protocol is used by FTP to transfer files over the Internet?

             •   TCP
             •   SMTP
             •   UDP
             •   SNMP




Perrine. J                               07/15/09                            Page 20
Cisco 1 - Networking Basics                                  Chapter 11




     Which TCP/IP layer is responsible for dialog control?

             1.   application
             2.   presentation
             3.   session
             4.   transport




Perrine. J                              07/15/09                     Page 21
Cisco 1 - Networking Basics                                  Chapter 11




     Which TCP/IP layer is responsible for dialog control?

             •   application
             •   presentation
             •   session
             •   transport




Perrine. J                              07/15/09                     Page 22
Cisco 1 - Networking Basics                                       Chapter 11




   What does TCP use to begin the three-way handshaking process?

             1.   The destination host sends an ACK segment.
             2.   The sending host sends a SYN segment.
             3.   The sending host sends a SYN and ACK segment.
             4.   The destination host sends a SYN segment.




Perrine. J                                 07/15/09                       Page 23
Cisco 1 - Networking Basics                                      Chapter 11




   What does TCP use to begin the three-way handshaking process?

             •   The destination host sends an ACK segment.
             •   The sending host sends a SYN segment.
             •   The sending host sends a SYN and ACK segment.
             •   The destination host sends a SYN segment.




Perrine. J                                07/15/09                       Page 24
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following protocols use TCP? (Choose two.)

             1.   FTP
             2.   DHCP
             3.   TFTP
             4.   HTTP
             5.   SYN




Perrine. J                             07/15/09                        Page 25
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following protocols use TCP? (Choose two.)

             •   FTP
             •   DHCP
             •   TFTP
             •   HTTP
             •   SYN




Perrine. J                             07/15/09                        Page 26
Cisco 1 - Networking Basics                                        Chapter 11




     Which of the following is true when the TCP window size is 3 and data
     transmission has just begun?

             1.   The source must receive an "ACK 3" acknowledgement before
                  sending more data.
             2.   The destination must receive an "ACK 3" acknowledgement before
                  accepting more data.
             3.   The source must receive an "ACK 4" acknowledgement before
                  sending more data.
             4.   The destination must receive an "ACK 4" acknowledgement before
                  accepting more data.




Perrine. J                                07/15/09                           Page 27
Cisco 1 - Networking Basics                                       Chapter 11




     Which of the following is true when the TCP window size is 3 and data
     transmission has just begun?

             •   The source must receive an "ACK 3" acknowledgement before
                 sending more data.
             •   The destination must receive an "ACK 3" acknowledgement before
                 accepting more data.
             •   The source must receive an "ACK 4" acknowledgement before
                 sending more data.
             •   The destination must receive an "ACK 4" acknowledgement before
                 accepting more data.




Perrine. J                               07/15/09                            Page 28
Cisco 1 - Networking Basics                                      Chapter 11




   Which protocol can be used to load or retrieve Cisco IOS images to or from a
   router?

             1.   SNMP
             2.   TFTP
             3.   UDP
             4.   TCP




Perrine. J                            07/15/09                            Page 29
Cisco 1 - Networking Basics                                      Chapter 11




   Which protocol can be used to load or retrieve Cisco IOS images to or from a
   router?

             •   SNMP
             •   TFTP
             •   UDP
             •   TCP




Perrine. J                            07/15/09                            Page 30

More Related Content

Viewers also liked

CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services QuestionsDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 

Viewers also liked (6)

CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 

Similar to Cisco Networking Chapter Quiz

Q1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet SwitchingQ1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet Switchingjerometnewman
 
Q1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And SubnetsQ1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And Subnetsjerometnewman
 
Q1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa NsQ1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa Nsjerometnewman
 
Q1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking FundamentalsQ1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking Fundamentalsjerometnewman
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI modelsJake Weaver
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015ICT PRISTINE
 
Hacking Robotics(English Version)
Hacking Robotics(English Version)Hacking Robotics(English Version)
Hacking Robotics(English Version)Kensei Demura
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephonyKundan Singh
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmpPalanivel Kuppusamy
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabusVinay Kumar C
 
Q1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To NetworkingQ1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To Networkingjerometnewman
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2Anne Starr
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gvvgy_a
 

Similar to Cisco Networking Chapter Quiz (20)

Q1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet SwitchingQ1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet Switching
 
Q1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And SubnetsQ1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And Subnets
 
Q1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa NsQ1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa Ns
 
Q1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking FundamentalsQ1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking Fundamentals
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015
 
Silc
SilcSilc
Silc
 
Hacking Robotics(English Version)
Hacking Robotics(English Version)Hacking Robotics(English Version)
Hacking Robotics(English Version)
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephony
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmp
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabus
 
Computer networks
Computer networksComputer networks
Computer networks
 
Q1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To NetworkingQ1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To Networking
 
SNMP
SNMPSNMP
SNMP
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
OSI Model
OSI ModelOSI Model
OSI Model
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Cisco Networking Chapter Quiz

  • 1. Cisco 1 - Networking Basics Chapter 11 At which layer of the TCP/IP model does Telnet operate? 1. application 2. presentation 3. session 4. transport 5. internet 6. network access Perrine. J 07/15/09 Page 1
  • 2. Cisco 1 - Networking Basics Chapter 11 At which layer of the TCP/IP model does Telnet operate? • application • presentation • session • transport • internet • network access Perrine. J 07/15/09 Page 2
  • 3. Cisco 1 - Networking Basics Chapter 11 Which of the following SNMP components would a router be considered? 1. network management system 2. agents 3. managed devices 4. secure ports Perrine. J 07/15/09 Page 3
  • 4. Cisco 1 - Networking Basics Chapter 11 Which of the following SNMP components would a router be considered? • network management system • agents • managed devices • secure ports Perrine. J 07/15/09 Page 4
  • 5. Cisco 1 - Networking Basics Chapter 11 Which SNMP component is responsible for using the majority of memory resources? 1. network management system 2. agents 3. managed devices 4. secure ports Perrine. J 07/15/09 Page 5
  • 6. Cisco 1 - Networking Basics Chapter 11 Which SNMP component is responsible for using the majority of memory resources? • network management system • agents • managed devices • secure ports Perrine. J 07/15/09 Page 6
  • 7. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by e-mail servers to communicate with each other? 1. FTP 2. HTTP 3. TFTP 4. SMTP 5. POP 6. SNMP Perrine. J 07/15/09 Page 7
  • 8. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by e-mail servers to communicate with each other? • FTP • HTTP • TFTP • SMTP • POP • SNMP Perrine. J 07/15/09 Page 8
  • 9. Cisco 1 - Networking Basics Chapter 11 Which part of the URL http://www.awsb.ca/teacher gives the name of the domain? 1. www 2. http:// 3. /teacher 4. awsb.ca Perrine. J 07/15/09 Page 9
  • 10. Cisco 1 - Networking Basics Chapter 11 Which part of the URL http://www.awsb.ca/teacher gives the name of the domain? • www • http:// • /teacher • awsb.ca Perrine. J 07/15/09 Page 10
  • 11. Cisco 1 - Networking Basics Chapter 11 Which of the following are disadvantages of using SMTP for e-mail servers? (Choose two.) 1. offers very little security 2. no authentication 3. strong reliability 4. does not work well with email servers Perrine. J 07/15/09 Page 11
  • 12. Cisco 1 - Networking Basics Chapter 11 Which of the following are disadvantages of using SMTP for e-mail servers? (Choose two.) • offers very little security • no authentication • strong reliability • does not work well with email servers Perrine. J 07/15/09 Page 12
  • 13. Cisco 1 - Networking Basics Chapter 11 Which of the following are components of SNMP? (Choose three.) 1. network management system 2. protocol analyzer 3. managed devices 4. secure ports 5. agents 6. protocol inspector Perrine. J 07/15/09 Page 13
  • 14. Cisco 1 - Networking Basics Chapter 11 Which of the following are components of SNMP? (Choose three.) • network management system • protocol analyzer • managed devices • secure ports • agents • protocol inspector Perrine. J 07/15/09 Page 14
  • 15. Cisco 1 - Networking Basics Chapter 11 Which of the following uses a connectionless protocol to transfer files? 1. FTP 2. TFTP 3. HTTP 4. SNMP Perrine. J 07/15/09 Page 15
  • 16. Cisco 1 - Networking Basics Chapter 11 Which of the following uses a connectionless protocol to transfer files? • FTP • TFTP • HTTP • SNMP Perrine. J 07/15/09 Page 16
  • 17. Cisco 1 - Networking Basics Chapter 11 Which type of institution does the domain suffix .org represent? 1. government 2. education 3. network 4. non-profit Perrine. J 07/15/09 Page 17
  • 18. Cisco 1 - Networking Basics Chapter 11 Which type of institution does the domain suffix .org represent? • government • education • network • non-profit Perrine. J 07/15/09 Page 18
  • 19. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by FTP to transfer files over the Internet? 1. TCP 2. SMTP 3. UDP 4. SNMP Perrine. J 07/15/09 Page 19
  • 20. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by FTP to transfer files over the Internet? • TCP • SMTP • UDP • SNMP Perrine. J 07/15/09 Page 20
  • 21. Cisco 1 - Networking Basics Chapter 11 Which TCP/IP layer is responsible for dialog control? 1. application 2. presentation 3. session 4. transport Perrine. J 07/15/09 Page 21
  • 22. Cisco 1 - Networking Basics Chapter 11 Which TCP/IP layer is responsible for dialog control? • application • presentation • session • transport Perrine. J 07/15/09 Page 22
  • 23. Cisco 1 - Networking Basics Chapter 11 What does TCP use to begin the three-way handshaking process? 1. The destination host sends an ACK segment. 2. The sending host sends a SYN segment. 3. The sending host sends a SYN and ACK segment. 4. The destination host sends a SYN segment. Perrine. J 07/15/09 Page 23
  • 24. Cisco 1 - Networking Basics Chapter 11 What does TCP use to begin the three-way handshaking process? • The destination host sends an ACK segment. • The sending host sends a SYN segment. • The sending host sends a SYN and ACK segment. • The destination host sends a SYN segment. Perrine. J 07/15/09 Page 24
  • 25. Cisco 1 - Networking Basics Chapter 11 Which of the following protocols use TCP? (Choose two.) 1. FTP 2. DHCP 3. TFTP 4. HTTP 5. SYN Perrine. J 07/15/09 Page 25
  • 26. Cisco 1 - Networking Basics Chapter 11 Which of the following protocols use TCP? (Choose two.) • FTP • DHCP • TFTP • HTTP • SYN Perrine. J 07/15/09 Page 26
  • 27. Cisco 1 - Networking Basics Chapter 11 Which of the following is true when the TCP window size is 3 and data transmission has just begun? 1. The source must receive an "ACK 3" acknowledgement before sending more data. 2. The destination must receive an "ACK 3" acknowledgement before accepting more data. 3. The source must receive an "ACK 4" acknowledgement before sending more data. 4. The destination must receive an "ACK 4" acknowledgement before accepting more data. Perrine. J 07/15/09 Page 27
  • 28. Cisco 1 - Networking Basics Chapter 11 Which of the following is true when the TCP window size is 3 and data transmission has just begun? • The source must receive an "ACK 3" acknowledgement before sending more data. • The destination must receive an "ACK 3" acknowledgement before accepting more data. • The source must receive an "ACK 4" acknowledgement before sending more data. • The destination must receive an "ACK 4" acknowledgement before accepting more data. Perrine. J 07/15/09 Page 28
  • 29. Cisco 1 - Networking Basics Chapter 11 Which protocol can be used to load or retrieve Cisco IOS images to or from a router? 1. SNMP 2. TFTP 3. UDP 4. TCP Perrine. J 07/15/09 Page 29
  • 30. Cisco 1 - Networking Basics Chapter 11 Which protocol can be used to load or retrieve Cisco IOS images to or from a router? • SNMP • TFTP • UDP • TCP Perrine. J 07/15/09 Page 30