Posted inDecember 28, 2018
Last updated on Jan 14, 2021 byAdministration
This quiz covers the content of Chapter 1 of Introduction to CCNA R&S Networks. It is intended to provide an additional opportunity to practice the skills and knowledge presented in the chapter and to prepare for the chapter exam.
Fill in the gap.
ITN Chapter 1 Questionnaire Answers 04
See the presentation. This is an example oftraineeThreat to the security of an organization.
- Note: There may be two correct answers:traineejwithinin netacad, but in our online system you can only usetrainee.Explanation:
Typical homeland security threats include weak or compromised passwords, lost or stolen devices, and malicious employees.
- Note: There may be two correct answers:traineejwithinin netacad, but in our online system you can only usetrainee.
What is a WAN?
- a network infrastructure to provide data storage, retrieval, and replication
- a network infrastructure that provides access to other networks over a large geographic area
- a network infrastructure covering a limited physical area, e.g. A city
- a network infrastructure that allows access in a small geographic areaExplanation:
A WAN provides access to other networks over a large geographic area. A SAN provides data storage, recovery, and replication. A MAN covers a limited physical area, such as a city. A LAN provides access over a small geographic area.
(Video) ITN Final Skills Exam PTSA
Associate the Internet connection type with the appropriate description or role. (Not all options are used.)
- MetroEthernet ——–>Business class high-speed copper or fiber connection
- Satellite ——->requires a plate and clear vision to serve
- SDSL ——->Business-class service offering the same upload and download speeds over phone lines
- Cabo ———>Signal transmitted over the same copper or fiber optic medium as the television signal
- Practical ——–>Mobile network accessExplanation:
DSL uses a high-speed modem to split the existing phone line into voice signaling, download and upload channels. SDSL is a DSL format that offers business-class service with the same download and upload speeds. The cable uses the same coaxial or fiber optic cable that carries television signals into the home to provide Internet access. The satellite requires a clear line of sight and is obstructed by trees and other obstacles. Mobile Internet access is provided via the mobile network. Cellular communications provide access to otherwise inaccessible areas. Metro Ethernet is a special commercial class of service that connects businesses to the Internet over copper or fiber optic cables at speeds up to 10 Gb/s.
What are two characteristics of a scalable network? (Choose two.)
- slightly congested with heavy traffic
- grows in size without impacting existing users
- not as reliable as a small network
- suitable for modular devices that allow for expansion
- offers a limited number of appsExplanation:
Scalable networks are networks that can grow without requiring costly replacement of existing network equipment. One way to make a network scalable is to purchase modular networking equipment.
What three devices are considered end devices on a network? (Choose three.)
- router
- to change
- VoIP-phone
- Security camera
- access point
- telepresence terminalExplanation:
Routers, switches, and access points are intermediary devices.
See the presentation. Match the example networks with the type of network. (Not all options are used.)
(Video) CCNA Exam Module-1 3ITN Chapter 1 Questionnaire Answers 02
- Rot A ——–>MANN
- Rot B——–>LAN
- Rot C——–>W-lan
- Rot D——–>BLASSExplanation:
Network A is a MAN. It consists of a number of different types of facilities linked together within the same geographical area. Network B is a LAN. It is located in a limited geographic area in a single building. Network C is a WLAN. It is a LAN where devices connect wirelessly. Finally, option D shows a WAN. It's two geographically separate LANs connected to the same enterprise.
ANDArpanetThe project started with the development of connections between networks using TCP/IP, which has now become the Internet.
- Hint: The correct answers can be 4:Arpanet,ARPANET,Branch network for advanced research projects, jAgency for advanced research projectsin netacad, but in our online system you can only useArpanet.
How is BYOD changing the way companies deploy networks?
- BYOD requires companies to buy laptops instead of desktops.
- BYOD users are responsible for their own network security, reducing the need for organizational security policies.
- BYOD devices are more expensive than those purchased by an organization.
- BYOD provides flexibility in where and how users can access network resources.Explanation:
A BYOD environment requires an organization to support a variety of devices and access methods. Personal devices that are not under the company's control may be involved, so security is paramount. On-premises hardware costs are reduced, allowing an organization to focus on providing collaboration tools and other software to BYOD users.
In which scenario is it advisable to use a WISP?
- an internet cafe in a city
- a farm in a rural setting without a wired broadband connection
- Any home with multiple wireless devices
- an apartment in a building with wired internet accessExplanation:
Wireless Internet Service Providers (WISPs) are usually located in rural areas where DSL or cable access is not available. A satellite dish or antenna on the participant premises connects wirelessly to a WISP transmitter, eliminating the need for physical cabling outside the building.
What is an ISP?
- It is a standards body that develops cabling and wiring standards for networks.
- It is a protocol that defines how computers communicate on a local area network.
- It is an organization that allows individuals and businesses to connect to the Internet.
- It is a network device that combines the functionality of several different network devices into one.Explanation:
An ISP, or Internet Service Provider, is an organization that provides Internet access to businesses and individuals.
(Video) NETACAD IT Essentials 7, ✔️ Chapter 1 : Introduction to the Personal Computer
A university is building a new dormitory on its campus. Workers are digging the ground to install a new water line to the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dorm rooms to the campus data center. Although the cable has been cut, students in residence halls experience only a brief interruption in network services. Which network function is shown here?
- Quality of Service (QoS)
- scalability
- Security
- fault tolerance
- integrityExplanation:
Fault tolerance is the property of a network that allows it to respond quickly to failures in equipment, media, or network services. Quality of Service refers to the measures taken to ensure that network traffic that requires higher performance is given the required network resources. Scalability refers to the ability of the network to grow to meet new demands. Security refers to protecting networks and data from theft, alteration, or destruction. Integrity refers to the completeness of something and is not generally used as a characteristic of networks like other terms.
Which statement describes a property of a converged network?
ITN Chapter 1 Questionnaire Answers 01
- A single network providing voice, video and data to a variety of devices.
- Network services are provided on a variety of network platforms.
- The network establishes separate communication channels for each network service.
- The network uses different technologies for voice, video and data.Explanation:
A converged network combines multiple network services such as video, voice and data transmission on a single platform and within a single infrastructure.
During a routine inspection, a technician discovered that software installed on a computer was secretly collecting data about websites visited by computer users. What kind of threat affects this computer?
- DoS attack
- Identity theft
- Spyware
- Zero-Day-AngriffExplanation:
Spyware is software that is installed on a network device and collects information.
(Video) Modules 1 3 Basic Network Connectivity and Communications Exam
An employee wants to remotely access the company's network in the most secure way possible. What network capability would allow an employee to gain secure remote access to a corporate network?
- life cycle assessment
- IPS
- VPN
- BYODExplanation:
Virtual Private Networks (VPNs) are used to provide secure access for remote workers.
See the presentation. Which term correctly identifies the type of device included in area B?
ITN Chapter 1 Questionnaire Answers 03
- source
- fin
- transfer
- mediatorExplanation:
Intranets connect LANs and WANs that only internal employees should have access to, while an extranet allows organizations to do business directly with other external organizations by giving them access to a portion of the internal network.
Fill in the gap.
EintranetIt is a private LAN and WAN connection owned by an organization and accessible only to the organization's members and employees or other authorized individuals.
- Hint: The correct answers can be 7:intranet,intranet,intranet,intranet,intranet,intranet
,INTRANETin netacad, but in our online system you can only useintranet.Explanation:Routers and switches are intermediary devices. End devices consist of PCs, laptops and servers. This also includes printers, VoIP phones, surveillance cameras and portable devices.
(Video) Day 1:- Live CCNA (Routing & Switching) || Network Kings
- Hint: The correct answers can be 7:intranet,intranet,intranet,intranet,intranet,intranet