CCNA 1 Chapter 1 midterm
Which project started the development of inter-network connections using TCP/IP that
has evolved into the Internet today. – answer Arpnet
Which three devices are considered end devices in a network? (Choose three.) -
answer1. VoIP phone
2.security camera
3. Tele Presence endpoint
What is an ISP? – answer Correct!
It is an organization that enables individuals and businesses to connect to the Internet.
Which statement describes a characteristic of a converged network? - answerA single
network that delivers voice, video, and data to a variety of devices.
In which scenario would the use of a WISP be recommended? - answer a farm in a rural
area without wired broadband access
During a routine inspection, a technician discovered that software that was installed on
a computer was secretly collecting data about websites that were visited by users of the
computer. Which type of threat is affecting this computer? - answer spyware
What is a WAN? - answera network infrastructure that provides access to other
networks over a large geographic area
A college is building a new dormitory on its campus. Workers are digging in the ground
to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic
cable that connects two of the existing dormitories to the campus data center. Although
the cable has been cut, students in the dormitories only experience a very short
interruption of network services. What characteristic of the network is shown here? -
answerfault tolerance
Refer to the exhibit. This represents an example of an
INTERNAL security threat to an organization.
Image= computer with pass on sticky note - answer! internal
An employee wants to access the network of the organization remotely, in the safest
possible way. What network feature would allow an employee to gain secure remote
access to a company network? - answerVPN
, A BLANK is a private connection of LANs and WANs that belongs to an organization,
and is designed to be accessible only by the members and employees of the
organization, or others with authorization. - answerIntranet
How does BYOD change the way in which businesses implement networks? -
answerBYOD provides flexibility in where and how users can access network
resources.
What are two characteristics of a scalable network? (Choose two.) - answer1.grows in
size without impacting existing users
2.suitable for modular devices that allow for expansion
Refer to the exhibit. Which term correctly identifies the device type that is included in the
area B? (image of packet source--B--Packet destination) - answerintermediary
A company is contemplating whether to use a client/server or a peer-to-peer network.
What are three characteristics of a peer-to-peer network? (Choose three.) -
answer1.lacks centralized administration *
2.less cost to implement*
3.easy to create*
Which device performs the function of determining the path that messages should take
through internetworks? - answera router
Which two statements describe intermediary devices? (Choose two.) -
answer1.Intermediary devices direct the path of the data. *
2.Intermediary devices connect individual hosts to the network.*
What two criteria are used to help select a network medium from various network
media? (Choose two.) - answer1. the distance the selected medium can successfully
carry a signal*
2. the environment where the selected medium is to be installed
An employee at a branch office is creating a quote for a customer. In order to do this,
the employee needs to access confidential pricing information from internal servers at
the Head Office. What type of network would the employee access? - answerintranet
What are two functions of end devices on a network? (Choose two? - answerThey
originate the data that flows through the network.*
They are the interface between humans and the communication network.*
Which area of the network would a college IT staff most likely have to redesign as a
direct result of many students bringing their own tablets and smartphones to school to
access school resources? - answerwireless LAN*
Which project started the development of inter-network connections using TCP/IP that
has evolved into the Internet today. – answer Arpnet
Which three devices are considered end devices in a network? (Choose three.) -
answer1. VoIP phone
2.security camera
3. Tele Presence endpoint
What is an ISP? – answer Correct!
It is an organization that enables individuals and businesses to connect to the Internet.
Which statement describes a characteristic of a converged network? - answerA single
network that delivers voice, video, and data to a variety of devices.
In which scenario would the use of a WISP be recommended? - answer a farm in a rural
area without wired broadband access
During a routine inspection, a technician discovered that software that was installed on
a computer was secretly collecting data about websites that were visited by users of the
computer. Which type of threat is affecting this computer? - answer spyware
What is a WAN? - answera network infrastructure that provides access to other
networks over a large geographic area
A college is building a new dormitory on its campus. Workers are digging in the ground
to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic
cable that connects two of the existing dormitories to the campus data center. Although
the cable has been cut, students in the dormitories only experience a very short
interruption of network services. What characteristic of the network is shown here? -
answerfault tolerance
Refer to the exhibit. This represents an example of an
INTERNAL security threat to an organization.
Image= computer with pass on sticky note - answer! internal
An employee wants to access the network of the organization remotely, in the safest
possible way. What network feature would allow an employee to gain secure remote
access to a company network? - answerVPN
, A BLANK is a private connection of LANs and WANs that belongs to an organization,
and is designed to be accessible only by the members and employees of the
organization, or others with authorization. - answerIntranet
How does BYOD change the way in which businesses implement networks? -
answerBYOD provides flexibility in where and how users can access network
resources.
What are two characteristics of a scalable network? (Choose two.) - answer1.grows in
size without impacting existing users
2.suitable for modular devices that allow for expansion
Refer to the exhibit. Which term correctly identifies the device type that is included in the
area B? (image of packet source--B--Packet destination) - answerintermediary
A company is contemplating whether to use a client/server or a peer-to-peer network.
What are three characteristics of a peer-to-peer network? (Choose three.) -
answer1.lacks centralized administration *
2.less cost to implement*
3.easy to create*
Which device performs the function of determining the path that messages should take
through internetworks? - answera router
Which two statements describe intermediary devices? (Choose two.) -
answer1.Intermediary devices direct the path of the data. *
2.Intermediary devices connect individual hosts to the network.*
What two criteria are used to help select a network medium from various network
media? (Choose two.) - answer1. the distance the selected medium can successfully
carry a signal*
2. the environment where the selected medium is to be installed
An employee at a branch office is creating a quote for a customer. In order to do this,
the employee needs to access confidential pricing information from internal servers at
the Head Office. What type of network would the employee access? - answerintranet
What are two functions of end devices on a network? (Choose two? - answerThey
originate the data that flows through the network.*
They are the interface between humans and the communication network.*
Which area of the network would a college IT staff most likely have to redesign as a
direct result of many students bringing their own tablets and smartphones to school to
access school resources? - answerwireless LAN*