CISCO CCNA v6 Chapter 1-5 Exam
2025 Questions and Answers
Router - ANSWER✔✔-Device that performs the function of determining the path that messages
should take through internetworks
wireless LAN - ANSWER✔✔-Area of the network that a college IT staff would most likely have to
redesign as a
direct result of many students bringing their own tablets and smartphones to school to
access school resources?
Easy to Create, Lacks Centralized Administration, Less cost to implement - ANSWER✔✔-Three
Characteristics of a peer-to-peer network
Distance a Selected medium can a successfully carry a signal, The environment where the selected
medium is to be installed. - ANSWER✔✔-Two criteria that are used to help select a network
medium from various network media.
Direct the path of the data and Connect individual hosts to the network. - ANSWER✔✔-Two
statements that describe intermediary devices
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1
,Originate the data that flows through the network and the is the interface between humans and the
communication network - ANSWER✔✔-Two functions of end devices on a network
Internet - ANSWER✔✔-Type of network that a home user must access in order to do online
shopping
Intranet - ANSWER✔✔-An employee needs to access confidential pricing information from
internal servers at a Head Office. What type of network would the employee access
DSL and Cable - ANSWER✔✔-Two connection options that provide an always-on, high-
bandwidth Internet connection to computers in a home office
Cellular and Satellite - ANSWER✔✔-Two Internet connection options that does not require the
physical cables to be run to the building
Congestion - ANSWER✔✔-term that describes the state of a network when the demand on the
network resources exceeds the available capacity
Video Conferencing - ANSWER✔✔-Type of a network traffic that requires QoS
Bandwidth - ANSWER✔✔-Measure of the data carrying capacity of the media
Data Confidentiality - ANSWER✔✔-Which data protection goal does implementing a policy that
requires strong, complex passwords support
Cloud computing - ANSWER✔✔-Applications can be accessed over the Internet by individual
users or business using any device anywhere in the world
Internet - ANSWER✔✔-Provides connections through interconnected global networks
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2
, Powerline networking - ANSWER✔✔-Device that connects to an existing home LAN using an
adapter and an existing electrical outlet
Capturing of personal data that leads to identity theft - ANSWER✔✔-A security violation that
would cause the most amount of damage to the life of a home user
Implementing a firewall and installing an antivirus software - ANSWER✔✔-Which two actions
would provide the minimum security requirements for implementing security on a small office
converged - ANSWER✔✔-network capable of delivering voice, video, text and graphics over the
same communication channels
BYOD - ANSWER✔✔-refers to the policy that allows employees to use their personal devices in
the business office to access the network and other resources
podcast - ANSWER✔✔-audio-based medium that allows people to deliver their recordings to a
wide audience
social media - ANSWER✔✔-interactive websites where people create and share user-generated
content with friends and family
wiki - ANSWER✔✔-web pages that groups of people can edit and view together
instant messaging - ANSWER✔✔-real-time communication between two or more people
blog - ANSWER✔✔-web pages easily updated and edited by a person who wants to express his or
her opinions about any subject
DSL - ANSWER✔✔-high bandwidth connection that runs over telephone line
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 3
2025 Questions and Answers
Router - ANSWER✔✔-Device that performs the function of determining the path that messages
should take through internetworks
wireless LAN - ANSWER✔✔-Area of the network that a college IT staff would most likely have to
redesign as a
direct result of many students bringing their own tablets and smartphones to school to
access school resources?
Easy to Create, Lacks Centralized Administration, Less cost to implement - ANSWER✔✔-Three
Characteristics of a peer-to-peer network
Distance a Selected medium can a successfully carry a signal, The environment where the selected
medium is to be installed. - ANSWER✔✔-Two criteria that are used to help select a network
medium from various network media.
Direct the path of the data and Connect individual hosts to the network. - ANSWER✔✔-Two
statements that describe intermediary devices
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1
,Originate the data that flows through the network and the is the interface between humans and the
communication network - ANSWER✔✔-Two functions of end devices on a network
Internet - ANSWER✔✔-Type of network that a home user must access in order to do online
shopping
Intranet - ANSWER✔✔-An employee needs to access confidential pricing information from
internal servers at a Head Office. What type of network would the employee access
DSL and Cable - ANSWER✔✔-Two connection options that provide an always-on, high-
bandwidth Internet connection to computers in a home office
Cellular and Satellite - ANSWER✔✔-Two Internet connection options that does not require the
physical cables to be run to the building
Congestion - ANSWER✔✔-term that describes the state of a network when the demand on the
network resources exceeds the available capacity
Video Conferencing - ANSWER✔✔-Type of a network traffic that requires QoS
Bandwidth - ANSWER✔✔-Measure of the data carrying capacity of the media
Data Confidentiality - ANSWER✔✔-Which data protection goal does implementing a policy that
requires strong, complex passwords support
Cloud computing - ANSWER✔✔-Applications can be accessed over the Internet by individual
users or business using any device anywhere in the world
Internet - ANSWER✔✔-Provides connections through interconnected global networks
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2
, Powerline networking - ANSWER✔✔-Device that connects to an existing home LAN using an
adapter and an existing electrical outlet
Capturing of personal data that leads to identity theft - ANSWER✔✔-A security violation that
would cause the most amount of damage to the life of a home user
Implementing a firewall and installing an antivirus software - ANSWER✔✔-Which two actions
would provide the minimum security requirements for implementing security on a small office
converged - ANSWER✔✔-network capable of delivering voice, video, text and graphics over the
same communication channels
BYOD - ANSWER✔✔-refers to the policy that allows employees to use their personal devices in
the business office to access the network and other resources
podcast - ANSWER✔✔-audio-based medium that allows people to deliver their recordings to a
wide audience
social media - ANSWER✔✔-interactive websites where people create and share user-generated
content with friends and family
wiki - ANSWER✔✔-web pages that groups of people can edit and view together
instant messaging - ANSWER✔✔-real-time communication between two or more people
blog - ANSWER✔✔-web pages easily updated and edited by a person who wants to express his or
her opinions about any subject
DSL - ANSWER✔✔-high bandwidth connection that runs over telephone line
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 3