CISCO CCNA INTRODUCTION TO
NETWORKS V7 (ITN) EXAM QUESTIONS
AND ANSWERS
Hosts - Correct Answers -All computers that are connected to a network and participate
directly in network communication are classified as
End Devices & Clients - Correct Answers -Hosts can be called
Hosts - Correct Answers -devices on the network that are assigned a number for
communication purposes
Internet Protocol (IP) address - Correct Answers -This number identifies the host within
a particular network.
An IP address - Correct Answers -identifies the host and the network to which the host
is attached.
Servers - Correct Answers -computers with software that allow them to provide
information, like email or web pages, to other end devices on the network
example of a client software - Correct Answers -a web browser, like Chrome or FireFox.
Email, Web & File - Correct Answers -What are the three common types of server
software?
Email - Correct Answers -The email server runs email server software. Clients use mail
client software, such as Microsoft Outlook, to access email on the server.
Web - Correct Answers -The web server runs web server software. Clients use browser
software, such as Windows Internet Explorer, to access web pages on the server.
File - Correct Answers -The file server stores corporate and user files in a central
location. The client devices access these files with client software such as the Windows
File Explorer.
, peer-to-peer network - Correct Answers -In small businesses and homes, many
computers function as the servers and clients on the network.
advantages of peer-to-peer networking - Correct Answers -Easy to set up
Less complexity
Lower cost since network devices and dedicated servers may not be required
Can be used for simple tasks such as transferring files and sharing printers
disadvantages of peer-to-peer networking - Correct Answers -No centralized
administration
Not as secure
Not scalable
All devices may act as both clients and servers which can slow their performance
End Devices - Correct Answers -A device that is either the source or the destination of a
packet on a network.
Metro Ethernet - Correct Answers -Metro ethernets extend LAN access technology into
the WAN.
Business DSL - Correct Answers -Business DSL is available in various formats. A
popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the
consumer version of DSL but provides uploads and downloads at the same high
speeds.
Satellite - Correct Answers -can provide a connection when a wired solution is not
available.
Intermediary Devices - Correct Answers -connect the individual end devices to the
network and can connect multiple individual networks to form an internetwork
Intermediary Network Devices perform some or all of these functions - Correct Answers
-regenerate and retransmit communication signals
maintain information about what pathways exist through the network and internetwork.
notify other devices of errors and communication failures.
direct data along alternate pathways when there is a link failure.
classify and direct messages according to priorities.
permit or deny the flow of data, based on security settings.
NETWORKS V7 (ITN) EXAM QUESTIONS
AND ANSWERS
Hosts - Correct Answers -All computers that are connected to a network and participate
directly in network communication are classified as
End Devices & Clients - Correct Answers -Hosts can be called
Hosts - Correct Answers -devices on the network that are assigned a number for
communication purposes
Internet Protocol (IP) address - Correct Answers -This number identifies the host within
a particular network.
An IP address - Correct Answers -identifies the host and the network to which the host
is attached.
Servers - Correct Answers -computers with software that allow them to provide
information, like email or web pages, to other end devices on the network
example of a client software - Correct Answers -a web browser, like Chrome or FireFox.
Email, Web & File - Correct Answers -What are the three common types of server
software?
Email - Correct Answers -The email server runs email server software. Clients use mail
client software, such as Microsoft Outlook, to access email on the server.
Web - Correct Answers -The web server runs web server software. Clients use browser
software, such as Windows Internet Explorer, to access web pages on the server.
File - Correct Answers -The file server stores corporate and user files in a central
location. The client devices access these files with client software such as the Windows
File Explorer.
, peer-to-peer network - Correct Answers -In small businesses and homes, many
computers function as the servers and clients on the network.
advantages of peer-to-peer networking - Correct Answers -Easy to set up
Less complexity
Lower cost since network devices and dedicated servers may not be required
Can be used for simple tasks such as transferring files and sharing printers
disadvantages of peer-to-peer networking - Correct Answers -No centralized
administration
Not as secure
Not scalable
All devices may act as both clients and servers which can slow their performance
End Devices - Correct Answers -A device that is either the source or the destination of a
packet on a network.
Metro Ethernet - Correct Answers -Metro ethernets extend LAN access technology into
the WAN.
Business DSL - Correct Answers -Business DSL is available in various formats. A
popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the
consumer version of DSL but provides uploads and downloads at the same high
speeds.
Satellite - Correct Answers -can provide a connection when a wired solution is not
available.
Intermediary Devices - Correct Answers -connect the individual end devices to the
network and can connect multiple individual networks to form an internetwork
Intermediary Network Devices perform some or all of these functions - Correct Answers
-regenerate and retransmit communication signals
maintain information about what pathways exist through the network and internetwork.
notify other devices of errors and communication failures.
direct data along alternate pathways when there is a link failure.
classify and direct messages according to priorities.
permit or deny the flow of data, based on security settings.