Introduction to Networks (Version 6.0) -
ITN Final Exam
What is a characteristic of a fault tolerant network? - ANS-a network that recovers quickly when
a failure occurs and depends on redundancy to limit the impact of a failure
(1.3.1 Converged Networks)
Three bank employees are using the corporate network. The first employee uses a web browser
to view a company web page in order to read some announcements. The second employee
accesses the corporate database to perform some financial transactions. The third employee
participates in an important live audio conference with other corporate managers in branch
offices. If QoS is implemented on this network, what will be the priorities from highest to lowest
of the different data types? - ANS-audio conference, financial transactions, web page
(1.3.2 Reliable Network)
What is a benefit of using cloud computing in networking? - ANS-Network capabilities are
extended without requiring investment in new infrastructure, personnel, or software.
(1.4.1 Network Trends)
What is the function of the shell in an OS? - ANS-It interfaces between the users and the kernel.
(2.1.1 Cisco IOS)
Which connection provides a secure CLI session with encryption to a Cisco switch? - ANS-an
SSH connection
(2.1.2 Cisco IOS Access)
A network technician is attempting to configure an interface by entering the following command:
SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the
device. What is the reason for this? - ANS-The command is being entered from the wrong mode
of operation.
(2.1.3 Navigate the IOS)
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping
command. What is the purpose of using these keystrokes? - ANS-to interrupt the ping process
(2.1.4 The Command Structure)
Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the
administrator uses a console connection to connect to the switch, which password is needed to
access user EXEC mode?
SW1(config)# enable password letmein
SW1(config)# enable secret secretin
, SW1(config)# line console 0
SW1(config-line)# password lineconin
SW1(config-line)# login
SW1(config-line)# exit - ANS-lineconin
(2.2.2 Limit Access to Device Configurations)
On which switch interface would an administrator configure an IP address so that the switch can
be managed remotely? - ANS-VLAN 1
(2.3.1 Ports and Addresses)
What protocol is responsible for controlling the size of segments and the rate at which segments
are exchanged between a web client and a web server? - ANS-TCP
(3.2.1 Protocols)
What is an advantage to using a protocol that is defined by an open standard? - ANS-It
encourages competition and promotes choices.
(3.2.3 Standard Organizations)
What are two benefits of using a layered network model? (Choose two.) - ANS-It assists in
protocol design.
It prevents technology in one layer from affecting other layers.
(3.2.4 Reference Models)
Which two OSI model layers have the same functionality as two layers of the TCP/IP model?
(Choose two.) - ANS-network
transport
(3.2.4 Reference Models)
Which name is assigned to the transport layer PDU? - ANS-segment
(3.3.1 Data Encapsulation)
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the
administrator notices that the signals generated by the server NIC are distorted and not usable.
In which layer of the OSI model is the error categorized? - ANS-physical layer
(4.1.2 Purpose of the Physical Layer)
A network administrator is measuring the transfer of bits across the company backbone for a
mission critical financial application. The administrator notices that the network throughput
appears lower than the bandwidth expected. Which three factors could influence the differences
in throughput? (Choose three.) - ANS-the amount of traffic that is currently crossing the network
the type of traffic that is crossing the network
the latency that is created by the number of network devices that the data is crossing
(4.1.3 Physical Layer Characteristics)
ITN Final Exam
What is a characteristic of a fault tolerant network? - ANS-a network that recovers quickly when
a failure occurs and depends on redundancy to limit the impact of a failure
(1.3.1 Converged Networks)
Three bank employees are using the corporate network. The first employee uses a web browser
to view a company web page in order to read some announcements. The second employee
accesses the corporate database to perform some financial transactions. The third employee
participates in an important live audio conference with other corporate managers in branch
offices. If QoS is implemented on this network, what will be the priorities from highest to lowest
of the different data types? - ANS-audio conference, financial transactions, web page
(1.3.2 Reliable Network)
What is a benefit of using cloud computing in networking? - ANS-Network capabilities are
extended without requiring investment in new infrastructure, personnel, or software.
(1.4.1 Network Trends)
What is the function of the shell in an OS? - ANS-It interfaces between the users and the kernel.
(2.1.1 Cisco IOS)
Which connection provides a secure CLI session with encryption to a Cisco switch? - ANS-an
SSH connection
(2.1.2 Cisco IOS Access)
A network technician is attempting to configure an interface by entering the following command:
SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the
device. What is the reason for this? - ANS-The command is being entered from the wrong mode
of operation.
(2.1.3 Navigate the IOS)
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping
command. What is the purpose of using these keystrokes? - ANS-to interrupt the ping process
(2.1.4 The Command Structure)
Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the
administrator uses a console connection to connect to the switch, which password is needed to
access user EXEC mode?
SW1(config)# enable password letmein
SW1(config)# enable secret secretin
, SW1(config)# line console 0
SW1(config-line)# password lineconin
SW1(config-line)# login
SW1(config-line)# exit - ANS-lineconin
(2.2.2 Limit Access to Device Configurations)
On which switch interface would an administrator configure an IP address so that the switch can
be managed remotely? - ANS-VLAN 1
(2.3.1 Ports and Addresses)
What protocol is responsible for controlling the size of segments and the rate at which segments
are exchanged between a web client and a web server? - ANS-TCP
(3.2.1 Protocols)
What is an advantage to using a protocol that is defined by an open standard? - ANS-It
encourages competition and promotes choices.
(3.2.3 Standard Organizations)
What are two benefits of using a layered network model? (Choose two.) - ANS-It assists in
protocol design.
It prevents technology in one layer from affecting other layers.
(3.2.4 Reference Models)
Which two OSI model layers have the same functionality as two layers of the TCP/IP model?
(Choose two.) - ANS-network
transport
(3.2.4 Reference Models)
Which name is assigned to the transport layer PDU? - ANS-segment
(3.3.1 Data Encapsulation)
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the
administrator notices that the signals generated by the server NIC are distorted and not usable.
In which layer of the OSI model is the error categorized? - ANS-physical layer
(4.1.2 Purpose of the Physical Layer)
A network administrator is measuring the transfer of bits across the company backbone for a
mission critical financial application. The administrator notices that the network throughput
appears lower than the bandwidth expected. Which three factors could influence the differences
in throughput? (Choose three.) - ANS-the amount of traffic that is currently crossing the network
the type of traffic that is crossing the network
the latency that is created by the number of network devices that the data is crossing
(4.1.3 Physical Layer Characteristics)