Networks with all Correct & 100% Verified Answers|
Guaranteed
Which two traffic types to Pass
use the Real-Time w
Transport Protocol (RTP)? (Choose two.) e
b
1 video
2 web
3 file transfer
4 voice
5 peer to peer
2. Which wireless technology has low-power
and data rate requirements making it
popular in home automa- tion applications?
ZigBee
LoRaWA
N 5G
Wi-Fi
3. Which layer of the TCP/IP model provides a
route to forward messages through an
internetwork?
application
network access
internet
transport
4. Which type of server relies on record types
such as A, NS, AAAA, and MX in order to
provide services?
DNS
ema
il file
1/
88
, CCNA 1 v7.0 Final Exam Full – Introduction to
Networks with all Correct & 100% Verified Answers|
1 video Guaranteed to Pass
4 voice
ZigBee
internet
DNS
2/
88
, CCNA 1 v7.0 Final Exam Full – Introduction to
Networks with all Correct & 100% Verified Answers|
Guaranteed to Pass
5. What are proprietary protocols? protocols developed
by organizations
-protocols developed by private organizations
who have control
to op- erate on any vendor hardware
over their defini-
-protocols that can be freely used by any
tion and operation
organization or vendor
-protocols developed by organizations who have
con- trol over their definition and operation
-a collection of protocols known as the TCP/IP
protocol suite
6. What service is provided by DNS?
Resolves domain
-Resolves domain names, such as cisco.com,
names, such as
into IP addresses.
cisco.com, into IP
-A basic set of rules for exchanging text,
addresses.
graphic im- ages, sound, video, and other
multimedia files on the web.
-Allows for data transfers between a client and
a file server.
-Uses encryption to secure the exchange of text,
graphic images, sound, and video on the
web.
7. A client packet is received by a server. The
packet has a destination port number of 110. POP3
What service is the client requesting?
DNS
DHC
P
SMTP
POP3
3/
88
, CCNA 1 v7.0 Final Exam Full – Introduction to Networks
with all Correct & 100% Verified Answers| Guaranteed to
Pass
8. What command can be used on a Windows PC ipconfig
to see the IP configuration of that computer?
show ip interface
brief ping
show interfaces
ipconfig
9. A wired laser printer is attached to a home peer-to-peer (P2P)
computer. That printer has been shared so that
other computers on the home network can
also use the printer. What networking model
is in use?
client-based
master-slave
point-to-point
peer-to-peer
(P2P) malicious software
or code running on an
10. What characteristic describes a virus? end
-a network device that filters access and traffic coming device
into a network
-the use of stolen credentials to access private data
-an attack that slows or crashes a device or
network service
-malicious software or code running on an end device
11. Three bank employees are using the corporate net-audio conference,
finan-
work. The first employee uses a web browser to view a cial
transactions, web