SlideShare a Scribd company logo
1 of 30
Cisco 1 - Networking Basics                                   Chapter 11




    At which layer of the TCP/IP model does Telnet operate?

             1.   application
             2.   presentation
             3.   session
             4.   transport
             5.   internet
             6.   network access




Perrine. J                            07/15/09                        Page 1
Cisco 1 - Networking Basics                                   Chapter 11




    At which layer of the TCP/IP model does Telnet operate?

             •   application
             •   presentation
             •   session
             •   transport
             •   internet
             •   network access




Perrine. J                            07/15/09                        Page 2
Cisco 1 - Networking Basics                                    Chapter 11




      Which of the following SNMP components would a router be considered?

             1.   network management system
             2.   agents
             3.   managed devices
             4.   secure ports




Perrine. J                             07/15/09                         Page 3
Cisco 1 - Networking Basics                                    Chapter 11




      Which of the following SNMP components would a router be considered?

             •   network management system
             •   agents
             •   managed devices
             •   secure ports




Perrine. J                            07/15/09                          Page 4
Cisco 1 - Networking Basics                                   Chapter 11




   Which SNMP component is responsible for using the majority of memory
   resources?

             1.   network management system
             2.   agents
             3.   managed devices
             4.   secure ports




Perrine. J                               07/15/09                         Page 5
Cisco 1 - Networking Basics                                   Chapter 11




   Which SNMP component is responsible for using the majority of memory
   resources?

             •   network management system
             •   agents
             •   managed devices
             •   secure ports




Perrine. J                            07/15/09                            Page 6
Cisco 1 - Networking Basics                                      Chapter 11




     Which protocol is used by e-mail servers to communicate with each other?

             1.   FTP
             2.   HTTP
             3.   TFTP
             4.   SMTP
             5.   POP
             6.   SNMP




Perrine. J                             07/15/09                           Page 7
Cisco 1 - Networking Basics                                      Chapter 11




     Which protocol is used by e-mail servers to communicate with each other?

             •   FTP
             •   HTTP
             •   TFTP
             •   SMTP
             •   POP
             •   SNMP




Perrine. J                             07/15/09                           Page 8
Cisco 1 - Networking Basics                                      Chapter 11




     Which part of the URL http://www.awsb.ca/teacher gives the name of the
     domain?

             1.   www
             2.   http://
             3.   /teacher
             4.   awsb.ca




Perrine. J                             07/15/09                           Page 9
Cisco 1 - Networking Basics                                      Chapter 11




     Which part of the URL http://www.awsb.ca/teacher gives the name of the
     domain?

             •   www
             •   http://
             •   /teacher
             •   awsb.ca




Perrine. J                             07/15/09                           Page 10
Cisco 1 - Networking Basics                                     Chapter 11




   Which of the following are disadvantages of using SMTP for e-mail servers?
   (Choose two.)

             1.   offers very little security
             2.   no authentication
             3.   strong reliability
             4.   does not work well with email servers




Perrine. J                                      07/15/09                  Page 11
Cisco 1 - Networking Basics                                     Chapter 11




   Which of the following are disadvantages of using SMTP for e-mail servers?
   (Choose two.)

             •   offers very little security
             •   no authentication
             •   strong reliability
             •   does not work well with email servers




Perrine. J                                     07/15/09                   Page 12
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following are components of SNMP? (Choose three.)

             1.   network management system
             2.   protocol analyzer
             3.   managed devices
             4.   secure ports
             5.   agents
             6.   protocol inspector




Perrine. J                              07/15/09                       Page 13
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following are components of SNMP? (Choose three.)

             •   network management system
             •   protocol analyzer
             •   managed devices
             •   secure ports
             •   agents
             •   protocol inspector




Perrine. J                            07/15/09                         Page 14
Cisco 1 - Networking Basics                                          Chapter 11




     Which of the following uses a connectionless protocol to transfer files?

             1.   FTP
             2.   TFTP
             3.   HTTP
             4.   SNMP




Perrine. J                               07/15/09                               Page 15
Cisco 1 - Networking Basics                                          Chapter 11




     Which of the following uses a connectionless protocol to transfer files?

             •   FTP
             •   TFTP
             •   HTTP
             •   SNMP




Perrine. J                               07/15/09                               Page 16
Cisco 1 - Networking Basics                                         Chapter 11




     Which type of institution does the domain suffix .org represent?

             1.   government
             2.   education
             3.   network
             4.   non-profit




Perrine. J                               07/15/09                           Page 17
Cisco 1 - Networking Basics                                         Chapter 11




     Which type of institution does the domain suffix .org represent?

             •   government
             •   education
             •   network
             •   non-profit




Perrine. J                               07/15/09                           Page 18
Cisco 1 - Networking Basics                                          Chapter 11




      Which protocol is used by FTP to transfer files over the Internet?

             1.   TCP
             2.   SMTP
             3.   UDP
             4.   SNMP




Perrine. J                               07/15/09                            Page 19
Cisco 1 - Networking Basics                                          Chapter 11




      Which protocol is used by FTP to transfer files over the Internet?

             •   TCP
             •   SMTP
             •   UDP
             •   SNMP




Perrine. J                               07/15/09                            Page 20
Cisco 1 - Networking Basics                                  Chapter 11




     Which TCP/IP layer is responsible for dialog control?

             1.   application
             2.   presentation
             3.   session
             4.   transport




Perrine. J                              07/15/09                     Page 21
Cisco 1 - Networking Basics                                  Chapter 11




     Which TCP/IP layer is responsible for dialog control?

             •   application
             •   presentation
             •   session
             •   transport




Perrine. J                              07/15/09                     Page 22
Cisco 1 - Networking Basics                                       Chapter 11




   What does TCP use to begin the three-way handshaking process?

             1.   The destination host sends an ACK segment.
             2.   The sending host sends a SYN segment.
             3.   The sending host sends a SYN and ACK segment.
             4.   The destination host sends a SYN segment.




Perrine. J                                 07/15/09                       Page 23
Cisco 1 - Networking Basics                                      Chapter 11




   What does TCP use to begin the three-way handshaking process?

             •   The destination host sends an ACK segment.
             •   The sending host sends a SYN segment.
             •   The sending host sends a SYN and ACK segment.
             •   The destination host sends a SYN segment.




Perrine. J                                07/15/09                       Page 24
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following protocols use TCP? (Choose two.)

             1.   FTP
             2.   DHCP
             3.   TFTP
             4.   HTTP
             5.   SYN




Perrine. J                             07/15/09                        Page 25
Cisco 1 - Networking Basics                                    Chapter 11




     Which of the following protocols use TCP? (Choose two.)

             •   FTP
             •   DHCP
             •   TFTP
             •   HTTP
             •   SYN




Perrine. J                             07/15/09                        Page 26
Cisco 1 - Networking Basics                                        Chapter 11




     Which of the following is true when the TCP window size is 3 and data
     transmission has just begun?

             1.   The source must receive an "ACK 3" acknowledgement before
                  sending more data.
             2.   The destination must receive an "ACK 3" acknowledgement before
                  accepting more data.
             3.   The source must receive an "ACK 4" acknowledgement before
                  sending more data.
             4.   The destination must receive an "ACK 4" acknowledgement before
                  accepting more data.




Perrine. J                                07/15/09                           Page 27
Cisco 1 - Networking Basics                                       Chapter 11




     Which of the following is true when the TCP window size is 3 and data
     transmission has just begun?

             •   The source must receive an "ACK 3" acknowledgement before
                 sending more data.
             •   The destination must receive an "ACK 3" acknowledgement before
                 accepting more data.
             •   The source must receive an "ACK 4" acknowledgement before
                 sending more data.
             •   The destination must receive an "ACK 4" acknowledgement before
                 accepting more data.




Perrine. J                               07/15/09                            Page 28
Cisco 1 - Networking Basics                                      Chapter 11




   Which protocol can be used to load or retrieve Cisco IOS images to or from a
   router?

             1.   SNMP
             2.   TFTP
             3.   UDP
             4.   TCP




Perrine. J                            07/15/09                            Page 29
Cisco 1 - Networking Basics                                      Chapter 11




   Which protocol can be used to load or retrieve Cisco IOS images to or from a
   router?

             •   SNMP
             •   TFTP
             •   UDP
             •   TCP




Perrine. J                            07/15/09                            Page 30

More Related Content

Viewers also liked

CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services QuestionsDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 

Viewers also liked (6)

CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 

Similar to Cisco Networking Chapter Quiz

Q1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet SwitchingQ1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet Switchingjerometnewman
 
Q1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And SubnetsQ1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And Subnetsjerometnewman
 
Q1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa NsQ1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa Nsjerometnewman
 
Q1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking FundamentalsQ1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking Fundamentalsjerometnewman
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI modelsJake Weaver
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015ICT PRISTINE
 
Hacking Robotics(English Version)
Hacking Robotics(English Version)Hacking Robotics(English Version)
Hacking Robotics(English Version)Kensei Demura
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephonyKundan Singh
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmpPalanivel Kuppusamy
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabusVinay Kumar C
 
Q1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To NetworkingQ1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To Networkingjerometnewman
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2Anne Starr
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gvvgy_a
 

Similar to Cisco Networking Chapter Quiz (20)

Q1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet SwitchingQ1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet Switching
 
Q1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And SubnetsQ1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And Subnets
 
Q1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa NsQ1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa Ns
 
Q1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking FundamentalsQ1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking Fundamentals
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015
 
Silc
SilcSilc
Silc
 
Hacking Robotics(English Version)
Hacking Robotics(English Version)Hacking Robotics(English Version)
Hacking Robotics(English Version)
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephony
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmp
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabus
 
Computer networks
Computer networksComputer networks
Computer networks
 
Q1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To NetworkingQ1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To Networking
 
SNMP
SNMPSNMP
SNMP
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
OSI Model
OSI ModelOSI Model
OSI Model
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Cisco Networking Chapter Quiz

  • 1. Cisco 1 - Networking Basics Chapter 11 At which layer of the TCP/IP model does Telnet operate? 1. application 2. presentation 3. session 4. transport 5. internet 6. network access Perrine. J 07/15/09 Page 1
  • 2. Cisco 1 - Networking Basics Chapter 11 At which layer of the TCP/IP model does Telnet operate? • application • presentation • session • transport • internet • network access Perrine. J 07/15/09 Page 2
  • 3. Cisco 1 - Networking Basics Chapter 11 Which of the following SNMP components would a router be considered? 1. network management system 2. agents 3. managed devices 4. secure ports Perrine. J 07/15/09 Page 3
  • 4. Cisco 1 - Networking Basics Chapter 11 Which of the following SNMP components would a router be considered? • network management system • agents • managed devices • secure ports Perrine. J 07/15/09 Page 4
  • 5. Cisco 1 - Networking Basics Chapter 11 Which SNMP component is responsible for using the majority of memory resources? 1. network management system 2. agents 3. managed devices 4. secure ports Perrine. J 07/15/09 Page 5
  • 6. Cisco 1 - Networking Basics Chapter 11 Which SNMP component is responsible for using the majority of memory resources? • network management system • agents • managed devices • secure ports Perrine. J 07/15/09 Page 6
  • 7. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by e-mail servers to communicate with each other? 1. FTP 2. HTTP 3. TFTP 4. SMTP 5. POP 6. SNMP Perrine. J 07/15/09 Page 7
  • 8. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by e-mail servers to communicate with each other? • FTP • HTTP • TFTP • SMTP • POP • SNMP Perrine. J 07/15/09 Page 8
  • 9. Cisco 1 - Networking Basics Chapter 11 Which part of the URL http://www.awsb.ca/teacher gives the name of the domain? 1. www 2. http:// 3. /teacher 4. awsb.ca Perrine. J 07/15/09 Page 9
  • 10. Cisco 1 - Networking Basics Chapter 11 Which part of the URL http://www.awsb.ca/teacher gives the name of the domain? • www • http:// • /teacher • awsb.ca Perrine. J 07/15/09 Page 10
  • 11. Cisco 1 - Networking Basics Chapter 11 Which of the following are disadvantages of using SMTP for e-mail servers? (Choose two.) 1. offers very little security 2. no authentication 3. strong reliability 4. does not work well with email servers Perrine. J 07/15/09 Page 11
  • 12. Cisco 1 - Networking Basics Chapter 11 Which of the following are disadvantages of using SMTP for e-mail servers? (Choose two.) • offers very little security • no authentication • strong reliability • does not work well with email servers Perrine. J 07/15/09 Page 12
  • 13. Cisco 1 - Networking Basics Chapter 11 Which of the following are components of SNMP? (Choose three.) 1. network management system 2. protocol analyzer 3. managed devices 4. secure ports 5. agents 6. protocol inspector Perrine. J 07/15/09 Page 13
  • 14. Cisco 1 - Networking Basics Chapter 11 Which of the following are components of SNMP? (Choose three.) • network management system • protocol analyzer • managed devices • secure ports • agents • protocol inspector Perrine. J 07/15/09 Page 14
  • 15. Cisco 1 - Networking Basics Chapter 11 Which of the following uses a connectionless protocol to transfer files? 1. FTP 2. TFTP 3. HTTP 4. SNMP Perrine. J 07/15/09 Page 15
  • 16. Cisco 1 - Networking Basics Chapter 11 Which of the following uses a connectionless protocol to transfer files? • FTP • TFTP • HTTP • SNMP Perrine. J 07/15/09 Page 16
  • 17. Cisco 1 - Networking Basics Chapter 11 Which type of institution does the domain suffix .org represent? 1. government 2. education 3. network 4. non-profit Perrine. J 07/15/09 Page 17
  • 18. Cisco 1 - Networking Basics Chapter 11 Which type of institution does the domain suffix .org represent? • government • education • network • non-profit Perrine. J 07/15/09 Page 18
  • 19. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by FTP to transfer files over the Internet? 1. TCP 2. SMTP 3. UDP 4. SNMP Perrine. J 07/15/09 Page 19
  • 20. Cisco 1 - Networking Basics Chapter 11 Which protocol is used by FTP to transfer files over the Internet? • TCP • SMTP • UDP • SNMP Perrine. J 07/15/09 Page 20
  • 21. Cisco 1 - Networking Basics Chapter 11 Which TCP/IP layer is responsible for dialog control? 1. application 2. presentation 3. session 4. transport Perrine. J 07/15/09 Page 21
  • 22. Cisco 1 - Networking Basics Chapter 11 Which TCP/IP layer is responsible for dialog control? • application • presentation • session • transport Perrine. J 07/15/09 Page 22
  • 23. Cisco 1 - Networking Basics Chapter 11 What does TCP use to begin the three-way handshaking process? 1. The destination host sends an ACK segment. 2. The sending host sends a SYN segment. 3. The sending host sends a SYN and ACK segment. 4. The destination host sends a SYN segment. Perrine. J 07/15/09 Page 23
  • 24. Cisco 1 - Networking Basics Chapter 11 What does TCP use to begin the three-way handshaking process? • The destination host sends an ACK segment. • The sending host sends a SYN segment. • The sending host sends a SYN and ACK segment. • The destination host sends a SYN segment. Perrine. J 07/15/09 Page 24
  • 25. Cisco 1 - Networking Basics Chapter 11 Which of the following protocols use TCP? (Choose two.) 1. FTP 2. DHCP 3. TFTP 4. HTTP 5. SYN Perrine. J 07/15/09 Page 25
  • 26. Cisco 1 - Networking Basics Chapter 11 Which of the following protocols use TCP? (Choose two.) • FTP • DHCP • TFTP • HTTP • SYN Perrine. J 07/15/09 Page 26
  • 27. Cisco 1 - Networking Basics Chapter 11 Which of the following is true when the TCP window size is 3 and data transmission has just begun? 1. The source must receive an "ACK 3" acknowledgement before sending more data. 2. The destination must receive an "ACK 3" acknowledgement before accepting more data. 3. The source must receive an "ACK 4" acknowledgement before sending more data. 4. The destination must receive an "ACK 4" acknowledgement before accepting more data. Perrine. J 07/15/09 Page 27
  • 28. Cisco 1 - Networking Basics Chapter 11 Which of the following is true when the TCP window size is 3 and data transmission has just begun? • The source must receive an "ACK 3" acknowledgement before sending more data. • The destination must receive an "ACK 3" acknowledgement before accepting more data. • The source must receive an "ACK 4" acknowledgement before sending more data. • The destination must receive an "ACK 4" acknowledgement before accepting more data. Perrine. J 07/15/09 Page 28
  • 29. Cisco 1 - Networking Basics Chapter 11 Which protocol can be used to load or retrieve Cisco IOS images to or from a router? 1. SNMP 2. TFTP 3. UDP 4. TCP Perrine. J 07/15/09 Page 29
  • 30. Cisco 1 - Networking Basics Chapter 11 Which protocol can be used to load or retrieve Cisco IOS images to or from a router? • SNMP • TFTP • UDP • TCP Perrine. J 07/15/09 Page 30