CCNA Book 1 Exam

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:50 PM on 4/9/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

30 Terms

1
New cards

Which layer of the TCP/IP model provides a route to forward messages through an internetwork?

INTERNET

2
New cards

Which two devices would be described as intermediary devices?

Wireless LAN controller

IPS

3
New cards

What characteristic describes a spyware

Software

4
New cards

Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?

DNS

A DNS server stores records that are used to resolve IP addresses to host names. Some DNS record types include the following: –

A – an end device IPV4 address.

NS- an authoritative name server

AAAA – an end device IPV6 address

MX – a male exchange record

5
New cards
6
New cards

What are proprietary protocols?

Protocols developed by organizations who have control over their definition and operation

Explanation: proprietary protocols have their definition and operation controlled by one company or vendor. Some of them can be used by different organizations with permission from the owner the TCP/IP protocol suite is an open standard not a proprietary protocol.

7
New cards

What service is provided by DNS

Resolve domain names, such as cisco.com, into IP addresses

Explanation: domain name system =

DNS

8
New cards

A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting?

POP3

Explanation: topic 14.4.3

9
New cards

What commands can be used on a Windows PC to see the IP configuration of that computer?

ipconfig

Explanation: topic 17.5.1

10
New cards

A wired laser printer is attached to a home computer that printer has been shared so that other computers on the home network can also use the printer what networking model is in use?

Peer – to - peer P2P

Explanation: topic 1.2.2

PTP networks have two or more network device devices that can share resources such as printers or files without having a dedicated server

11
New cards

What characteristic describes a virus?

Malicious software or code running on an end device

Explanation: topic 16.2.1

12
New cards

Three bank employees are using the corporate network. The first employee uses a web browser to view a company page in order to read some announcements. The second employee access is the corporate database to perform some financial transactions. The third employee participates in an important live video conference with other corporate managers in branch offices if QOS is implemented on this network what will be the priorities from highest to lowest of the different data types?

Audio conference, financial transactions, webpage

Explanation: topics 1.6.4

QOS mechanisms enable the establishments of Q management strategies that enforce priorities for different categories of application data. Thus this queuing enables voice data to have priority over transaction data which has priority over web data.

13
New cards
<p>Match the description to the IP V6 addressing component</p>

Match the description to the IP V6 addressing component

This part of the address is used by an organization to identify subnets: subnet ID

This network portion of the address is assigned by the provider: global routing prefix

This part of the address is the equivalent to the host portion of an IPV4 address: interface ID

14
New cards
<p>Referred to the exhibit if host one were to transfer a file to the server what layers of the TCP/IP model would be used?</p>

Referred to the exhibit if host one were to transfer a file to the server what layers of the TCP/IP model would be used?

Application, transport, Internet, and network access layers

Explanation: topic 3.5.3

The TCP/IP model contains the application, transport, Internet, and network access layers. A file transfer uses the FTP application layer protocol. The data would move from the application layer through all of the layers of the model at across the network to the file server.

15
New cards
<p>Match the characteristic to the forwarding method.</p>

Match the characteristic to the forwarding method.

Always stored the entire frame: store and forward. Target.

Check the CRC before Forwarding: store and forward. target

Check the frame length before forwarding: store and forward. Target.

Has low latency: cut through. Target.

May forward rent frames: cut through. Target.

Begins forwarding when the destination address is received: cut through. Target.

<p>Always stored the entire frame: store and forward. Target.</p><p></p><p>Check the CRC before Forwarding: store and forward. target</p><p></p><p>Check the frame length before forwarding: store and forward. Target.</p><p></p><p>Has low latency: cut through. Target.</p><p>May forward rent frames: cut through. Target.</p><p></p><p>Begins forwarding when the destination address is received: cut through. Target.</p>
16
New cards
17
New cards
18
New cards

Which two OSI model layers have the same functionality as two layers of the TCP/IP model

Network

Transport

19
New cards

Which PDU is processed when a host computer is De-encapsulating a message at the transport layer of the TCP/IP model

Segment

20
New cards

Which two statements describe the characteristics of fiber optic cable

Fiber optic cabling does not conduct electricity

Fiber optic cabling is primarily used as a backbone cabling

21
New cards

What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time

throughput

22
New cards
<p>Referred to the exhibit what is the maximum possible throughput between the PC and the server?</p>

Referred to the exhibit what is the maximum possible throughput between the PC and the server?

128 kg bits per second

23
New cards

Which two acronyms represent the data a link sub layers that ethernet relies upon to operate

MAC

LLC

24
New cards

Although CMA/CD is still a feature of the ethernet wise and no longer necessary

The use of full duplex, capable layer two switches

25
New cards

A network team is comparing to apologies for connecting on a shared media. Which physical topology is an example of a hybrid topology

Extended star

26
New cards

What does a router do when it receives a layer two frame over the network medium

De encapsulates the frame

27
New cards

What routing table entry has a next hop address associated with a destination network

Remote routes

28
New cards

Why is NAT not needed in IPv6?

Any host or user can get a public IPB6 network address because the number of available IPv6 addresses is extremely large

29
New cards

Which term describes a field in the IPV four packet header that contains a unicast multicast or broadcast address

Destination, IPV4 address

30
New cards