SlideShare una empresa de Scribd logo
1 de 8
CCNA 1 Chapter 1 v5.0
answers
1. Which two Internet solutions provide an always-on, high-
bandwidth connection to computers on a LAN? (Choose two.)
cellular
DSL
satellite
cable
dial-up telephone
2. What type of network must a home user access in order to do
online shopping?
a local area network
the Internet
an extranet
an intranet
3. What are two functions of intermediary devices on a network?
(Choose two.)
They are the primary source and providers of information and
services to end devices.
They form the interface between the human network and the
underlying communication network.
They direct data along alternate pathways when there is a link failure.
They run applications that support collaboration for business.
They filter the flow of data, basedon security settings.
4. Fill in the blank.
The acronym BYOD refers to the trend of end users being able to
use their personal devices to access the business network and
resources.
5. Which descriptioncorrectlydefines a converged network?
a network that allows users to interact directly with each other over
multiple channels
a network that is limited to exchanging character-based information
a dedicated network with separate channels for video and voice
services
a single network channel capable of delivering multiple
communication forms
6.
Drag and drop
Match each characteristic to its corresponding internet conectivity
type.
satellite -> Not suited for heavily wooded areas
dialup telephone -> typically has very low bandwidth
DSL -> splits the access line into three signals
cable -> uses coaxial cable as a medium
7.
Drag and drop
Match the form of network communication with its description.
Web pages that groups of people can edit and view together -> wiki
Interactive websites where people created and share user-
generated content with friends and family -> Social media
real-time communication of between two or more people -> instant
messaging
an audio-based medium that allows people to deliver their
recordings to a wide audience -> podcast
8. Drag and drop
Match each definition to the corresponding security goal:
maintaining integrity -> the assurance that the information has not
been altered during transmission
ensuring confidentiality -> only the intended recipients can access
and read the data
ensuring availability -> the assurance of timely and reliable access
to data
9. Which statement describesa characteristic of cloud computing?
A business can connectdirectly to the Internet without the use of an
ISP.
Devices can connect to the Internet through existing electrical wiring.
Investment in new infrastructure is required in order to access the
cloud.
Applications can be accessedoverthe Internet through a subscription.
10. Which two Internet connection options do not require that
physical cables be run to the building? (Choose two.)
cellular
dialup
satellite
DSL
dedicated leased line
11. What is a characteristic of circuit-switched networks?
A single message canbe broken into multiple message blocks that
are transmitted through multiple circuits simultaneously.
If all circuits are busy, a new call cannot be placed.
If a circuit fails, the call will be forwarded on a new path.
Circuit-switched networks can dynamically learn and use redundant
circuits.
12. Requiring strong, complexpasswords is a practice that supports
which network security goal?
maintaining communicationintegrity
ensuring redundancy
ensuring data confidentiality
ensuring reliability of access
13. What two criteria are used to help selectnetwork media?
(Choose two.)
the distance the media cansuccessfullycarry a signal
the environment where the media is to be installed
the cost of the end devices utilized in the network
the number of intermediary devices installed in the network
the types of data that need to be prioritized
14. Which statement describes anetwork that supports QoS?
Data sent over the network is not altered in transmission.
The fewest possibledevices are affected bya failure.
The network provides predictable levels of service to different types of
traffic.
The network should be able to expand to keep up with user demand.
15.
Referto the exhibit. Which set of devices contains only intermediary
devices?
A, B, E, F
A, B, D, G
G, H, I, J
C, D, G, I
16. Which device performs the function of determining the path that
messagesshould take through internetworks?
a web server
a DSL modem
a router
a firewall
17. Which tool provides real-time video and audio communication
over the Internet so that businesses can conduct corporate meetings
with participants from several remote locations?
wiki
instant messaging
weblog
TelePresence
18. Which two statements about the relationship between LANs and
WANs are true? (Choose two.)
Both LANs and WANs connect end devices.
WANs are typically operated through multiple ISPs, but LANs are
typically operatedby single organizations or individuals.
WANs connectLANs at slowerspeedbandwidth than LANs connect
their internal end devices.
The Internet is a WAN.
WANs must be publicly-owned, but LANs can be owned by either
public or private entities.
19. Which three network tools provide the minimum required
security protectionfor home users? (Choose three.)
antivirus software
antispyware software
an intrusion prevention system
powerline networking
a firewall
access control lists
20. Which area of the network would a college IT staff most likely
have to redesignas a direct result of many students bringing their
own tablets and smartphones to schoolto access schoolresources?
intranet
wired LAN
wireless LAN
extranet
wireless WAN
21. Which expressionaccurately defines the term congestion?
a method of limiting the impact of a hardware or software failure on
the network
a set of techniques to manage the utilization of network resources
a state where the demand on the network resources exceeds the
available capacity
a measure of the data carrying capacity of the network

Más contenido relacionado

La actualidad más candente

Types of network
Types of networkTypes of network
Types of networkAli Mughal
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranetcalix_ricia
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017Saurabh Verma
 
Template s07.1 [2015]
Template s07.1 [2015]Template s07.1 [2015]
Template s07.1 [2015]Bazlin Ahmad
 
Bluetooth Broadcasting
Bluetooth BroadcastingBluetooth Broadcasting
Bluetooth Broadcastingijtsrd
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technologyNeha Jella
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communicationRizwan Razman
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer networkkabtanxiray
 
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...BDDazza
 
The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)ainizbahari97
 
Wireless broadband technology
Wireless broadband technologyWireless broadband technology
Wireless broadband technologyJohnNjuguna23
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Likan Patra
 

La actualidad más candente (20)

Final isp
Final ispFinal isp
Final isp
 
Wi fi
Wi fiWi fi
Wi fi
 
Types of network
Types of networkTypes of network
Types of network
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017
 
Template s07.1 [2015]
Template s07.1 [2015]Template s07.1 [2015]
Template s07.1 [2015]
 
ICTL
ICTLICTL
ICTL
 
Bluetooth Broadcasting
Bluetooth BroadcastingBluetooth Broadcasting
Bluetooth Broadcasting
 
Network
NetworkNetwork
Network
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technology
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer network
 
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
 
The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)
 
Blue tooth
Blue toothBlue tooth
Blue tooth
 
Wireless broadband technology
Wireless broadband technologyWireless broadband technology
Wireless broadband technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
ISP India
ISP IndiaISP India
ISP India
 
Isp
IspIsp
Isp
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?
 

Similar a Ccna 1 chapter 1 v5

Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...sherinjoyson
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod pptDhruvilSTATUS
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptkrishna683602
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptSmitaPatil541701
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basicCeoTranDang
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledgessuseree2ffc
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .pptPawanKayande1
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...ssuser036308
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptnilesh405711
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptunnipb1
 
Computer Networking - Complete Resume Guide
Computer Networking - Complete Resume GuideComputer Networking - Complete Resume Guide
Computer Networking - Complete Resume Guidezcorpio
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 

Similar a Ccna 1 chapter 1 v5 (20)

Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Networking devices.ppt
Networking devices.pptNetworking devices.ppt
Networking devices.ppt
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.ppt
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledge
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .ppt
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.ppt
 
Computer Networking - Complete Resume Guide
Computer Networking - Complete Resume GuideComputer Networking - Complete Resume Guide
Computer Networking - Complete Resume Guide
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Ccna 1 chapter 1 v5

  • 1. CCNA 1 Chapter 1 v5.0 answers 1. Which two Internet solutions provide an always-on, high- bandwidth connection to computers on a LAN? (Choose two.) cellular DSL satellite cable dial-up telephone 2. What type of network must a home user access in order to do online shopping? a local area network the Internet an extranet an intranet 3. What are two functions of intermediary devices on a network? (Choose two.) They are the primary source and providers of information and services to end devices. They form the interface between the human network and the underlying communication network. They direct data along alternate pathways when there is a link failure. They run applications that support collaboration for business. They filter the flow of data, basedon security settings.
  • 2. 4. Fill in the blank. The acronym BYOD refers to the trend of end users being able to use their personal devices to access the business network and resources. 5. Which descriptioncorrectlydefines a converged network? a network that allows users to interact directly with each other over multiple channels a network that is limited to exchanging character-based information a dedicated network with separate channels for video and voice services a single network channel capable of delivering multiple communication forms 6. Drag and drop Match each characteristic to its corresponding internet conectivity type.
  • 3. satellite -> Not suited for heavily wooded areas dialup telephone -> typically has very low bandwidth DSL -> splits the access line into three signals cable -> uses coaxial cable as a medium 7. Drag and drop Match the form of network communication with its description. Web pages that groups of people can edit and view together -> wiki Interactive websites where people created and share user- generated content with friends and family -> Social media real-time communication of between two or more people -> instant messaging an audio-based medium that allows people to deliver their recordings to a wide audience -> podcast
  • 4. 8. Drag and drop Match each definition to the corresponding security goal: maintaining integrity -> the assurance that the information has not been altered during transmission ensuring confidentiality -> only the intended recipients can access and read the data ensuring availability -> the assurance of timely and reliable access to data 9. Which statement describesa characteristic of cloud computing? A business can connectdirectly to the Internet without the use of an ISP. Devices can connect to the Internet through existing electrical wiring. Investment in new infrastructure is required in order to access the cloud. Applications can be accessedoverthe Internet through a subscription. 10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
  • 5. cellular dialup satellite DSL dedicated leased line 11. What is a characteristic of circuit-switched networks? A single message canbe broken into multiple message blocks that are transmitted through multiple circuits simultaneously. If all circuits are busy, a new call cannot be placed. If a circuit fails, the call will be forwarded on a new path. Circuit-switched networks can dynamically learn and use redundant circuits. 12. Requiring strong, complexpasswords is a practice that supports which network security goal? maintaining communicationintegrity ensuring redundancy ensuring data confidentiality ensuring reliability of access 13. What two criteria are used to help selectnetwork media? (Choose two.) the distance the media cansuccessfullycarry a signal the environment where the media is to be installed the cost of the end devices utilized in the network
  • 6. the number of intermediary devices installed in the network the types of data that need to be prioritized 14. Which statement describes anetwork that supports QoS? Data sent over the network is not altered in transmission. The fewest possibledevices are affected bya failure. The network provides predictable levels of service to different types of traffic. The network should be able to expand to keep up with user demand. 15. Referto the exhibit. Which set of devices contains only intermediary devices? A, B, E, F A, B, D, G G, H, I, J C, D, G, I
  • 7. 16. Which device performs the function of determining the path that messagesshould take through internetworks? a web server a DSL modem a router a firewall 17. Which tool provides real-time video and audio communication over the Internet so that businesses can conduct corporate meetings with participants from several remote locations? wiki instant messaging weblog TelePresence 18. Which two statements about the relationship between LANs and WANs are true? (Choose two.) Both LANs and WANs connect end devices. WANs are typically operated through multiple ISPs, but LANs are typically operatedby single organizations or individuals. WANs connectLANs at slowerspeedbandwidth than LANs connect their internal end devices. The Internet is a WAN. WANs must be publicly-owned, but LANs can be owned by either public or private entities.
  • 8. 19. Which three network tools provide the minimum required security protectionfor home users? (Choose three.) antivirus software antispyware software an intrusion prevention system powerline networking a firewall access control lists 20. Which area of the network would a college IT staff most likely have to redesignas a direct result of many students bringing their own tablets and smartphones to schoolto access schoolresources? intranet wired LAN wireless LAN extranet wireless WAN 21. Which expressionaccurately defines the term congestion? a method of limiting the impact of a hardware or software failure on the network a set of techniques to manage the utilization of network resources a state where the demand on the network resources exceeds the available capacity a measure of the data carrying capacity of the network