ITN Cisco Chapter 1 Exam 2019 100% Answers - Premium IT Exam Answers (2023)

Table of Contents
Fill in the gap. See the presentation. This is an example oftraineeThreat to the security of an organization. What is a WAN? Associate the Internet connection type with the appropriate description or role. (Not all options are used.) What are two characteristics of a scalable network? (Choose two.) What three devices are considered end devices on a network? (Choose three.) See the presentation. Match the example networks with the type of network. (Not all options are used.) ANDArpanetThe project started with the development of connections between networks using TCP/IP, which has now become the Internet. How is BYOD changing the way companies deploy networks? In which scenario is it advisable to use a WISP? What is an ISP? A university is building a new dormitory on its campus. Workers are digging the ground to install a new water line to the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dorm rooms to the campus data center. Although the cable has been cut, students in residence halls experience only a brief interruption in network services. Which network function is shown here? Which statement describes a property of a converged network? During a routine inspection, a technician discovered that software installed on a computer was secretly collecting data about websites visited by computer users. What kind of threat affects this computer? An employee wants to remotely access the company's network in the most secure way possible. What network capability would allow an employee to gain secure remote access to a corporate network? See the presentation. Which term correctly identifies the type of device included in area B? Fill in the gap. EintranetIt is a private LAN and WAN connection owned by an organization and accessible only to the organization's members and employees or other authorized individuals. Videos

Posted inDecember 28, 2018

Last updated on Jan 14, 2021 byAdministration

This quiz covers the content of Chapter 1 of Introduction to CCNA R&S Networks. It is intended to provide an additional opportunity to practice the skills and knowledge presented in the chapter and to prepare for the chapter exam.

  1. Fill in the gap.

    ITN Chapter 1 Questionnaire Answers 04

    See the presentation. This is an example oftraineeThreat to the security of an organization.

    • Note: There may be two correct answers:traineejwithinin netacad, but in our online system you can only usetrainee.
      Explanation:

      Typical homeland security threats include weak or compromised passwords, lost or stolen devices, and malicious employees.

  2. What is a WAN?

    • a network infrastructure to provide data storage, retrieval, and replication
    • a network infrastructure that provides access to other networks over a large geographic area
    • a network infrastructure covering a limited physical area, e.g. A city
    • a network infrastructure that allows access in a small geographic area
      Explanation:

      A WAN provides access to other networks over a large geographic area. A SAN provides data storage, recovery, and replication. A MAN covers a limited physical area, such as a city. A LAN provides access over a small geographic area.

      (Video) ITN Final Skills Exam PTSA
  3. Associate the Internet connection type with the appropriate description or role. (Not all options are used.)

    • MetroEthernet ——–>Business class high-speed copper or fiber connection
    • Satellite ——->requires a plate and clear vision to serve
    • SDSL ——->Business-class service offering the same upload and download speeds over phone lines
    • Cabo ———>Signal transmitted over the same copper or fiber optic medium as the television signal
    • Practical ——–>Mobile network access
      Explanation:

      DSL uses a high-speed modem to split the existing phone line into voice signaling, download and upload channels. SDSL is a DSL format that offers business-class service with the same download and upload speeds. The cable uses the same coaxial or fiber optic cable that carries television signals into the home to provide Internet access. The satellite requires a clear line of sight and is obstructed by trees and other obstacles. Mobile Internet access is provided via the mobile network. Cellular communications provide access to otherwise inaccessible areas. Metro Ethernet is a special commercial class of service that connects businesses to the Internet over copper or fiber optic cables at speeds up to 10 Gb/s.

  4. What are two characteristics of a scalable network? (Choose two.)

    • slightly congested with heavy traffic
    • grows in size without impacting existing users
    • not as reliable as a small network
    • suitable for modular devices that allow for expansion
    • offers a limited number of apps
      Explanation:

      Scalable networks are networks that can grow without requiring costly replacement of existing network equipment. One way to make a network scalable is to purchase modular networking equipment.

  5. What three devices are considered end devices on a network? (Choose three.)

    • router
    • to change
    • VoIP-phone
    • Security camera
    • access point
    • telepresence terminal
      Explanation:

      Routers, switches, and access points are intermediary devices.

  6. See the presentation. Match the example networks with the type of network. (Not all options are used.)

    (Video) CCNA Exam Module-1 3

    ITN Chapter 1 Questionnaire Answers 02

    • Rot A ——–>MANN
    • Rot B——–>LAN
    • Rot C——–>W-lan
    • Rot D——–>BLASS
      Explanation:

      Network A is a MAN. It consists of a number of different types of facilities linked together within the same geographical area. Network B is a LAN. It is located in a limited geographic area in a single building. Network C is a WLAN. It is a LAN where devices connect wirelessly. Finally, option D shows a WAN. It's two geographically separate LANs connected to the same enterprise.

  7. ANDArpanetThe project started with the development of connections between networks using TCP/IP, which has now become the Internet.

    • Hint: The correct answers can be 4:Arpanet,ARPANET,Branch network for advanced research projects, jAgency for advanced research projectsin netacad, but in our online system you can only useArpanet.
  8. How is BYOD changing the way companies deploy networks?

    • BYOD requires companies to buy laptops instead of desktops.
    • BYOD users are responsible for their own network security, reducing the need for organizational security policies.
    • BYOD devices are more expensive than those purchased by an organization.
    • BYOD provides flexibility in where and how users can access network resources.
      Explanation:

      A BYOD environment requires an organization to support a variety of devices and access methods. Personal devices that are not under the company's control may be involved, so security is paramount. On-premises hardware costs are reduced, allowing an organization to focus on providing collaboration tools and other software to BYOD users.

  9. In which scenario is it advisable to use a WISP?

    • an internet cafe in a city
    • a farm in a rural setting without a wired broadband connection
    • Any home with multiple wireless devices
    • an apartment in a building with wired internet access
      Explanation:

      Wireless Internet Service Providers (WISPs) are usually located in rural areas where DSL or cable access is not available. A satellite dish or antenna on the participant premises connects wirelessly to a WISP transmitter, eliminating the need for physical cabling outside the building.

  10. What is an ISP?

    • It is a standards body that develops cabling and wiring standards for networks.
    • It is a protocol that defines how computers communicate on a local area network.
    • It is an organization that allows individuals and businesses to connect to the Internet.
    • It is a network device that combines the functionality of several different network devices into one.
      Explanation:

      An ISP, or Internet Service Provider, is an organization that provides Internet access to businesses and individuals.

      (Video) NETACAD IT Essentials 7, ✔️ Chapter 1 : Introduction to the Personal Computer
  11. A university is building a new dormitory on its campus. Workers are digging the ground to install a new water line to the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dorm rooms to the campus data center. Although the cable has been cut, students in residence halls experience only a brief interruption in network services. Which network function is shown here?

    • Quality of Service (QoS)
    • scalability
    • Security
    • fault tolerance
    • integrity
      Explanation:

      Fault tolerance is the property of a network that allows it to respond quickly to failures in equipment, media, or network services. Quality of Service refers to the measures taken to ensure that network traffic that requires higher performance is given the required network resources. Scalability refers to the ability of the network to grow to meet new demands. Security refers to protecting networks and data from theft, alteration, or destruction. Integrity refers to the completeness of something and is not generally used as a characteristic of networks like other terms.

  12. Which statement describes a property of a converged network?

    ITN Chapter 1 Questionnaire Answers 01

    • A single network providing voice, video and data to a variety of devices.
    • Network services are provided on a variety of network platforms.
    • The network establishes separate communication channels for each network service.
    • The network uses different technologies for voice, video and data.
      Explanation:

      A converged network combines multiple network services such as video, voice and data transmission on a single platform and within a single infrastructure.

  13. During a routine inspection, a technician discovered that software installed on a computer was secretly collecting data about websites visited by computer users. What kind of threat affects this computer?

    • DoS attack
    • Identity theft
    • Spyware
    • Zero-Day-Angriff
      Explanation:

      Spyware is software that is installed on a network device and collects information.

      (Video) Modules 1 3 Basic Network Connectivity and Communications Exam
  14. An employee wants to remotely access the company's network in the most secure way possible. What network capability would allow an employee to gain secure remote access to a corporate network?

    • life cycle assessment
    • IPS
    • VPN
    • BYOD
      Explanation:

      Virtual Private Networks (VPNs) are used to provide secure access for remote workers.

  15. See the presentation. Which term correctly identifies the type of device included in area B?

    ITN Chapter 1 Questionnaire Answers 03

    • source
    • fin
    • transfer
    • mediator
      Explanation:

      Intranets connect LANs and WANs that only internal employees should have access to, while an extranet allows organizations to do business directly with other external organizations by giving them access to a portion of the internal network.

  16. Fill in the gap.

    EintranetIt is a private LAN and WAN connection owned by an organization and accessible only to the organization's members and employees or other authorized individuals.

    • Hint: The correct answers can be 7:intranet,intranet,intranet,intranet,intranet,intranet
      ,INTRANETin netacad, but in our online system you can only useintranet.
      Explanation:

      Routers and switches are intermediary devices. End devices consist of PCs, laptops and servers. This also includes printers, VoIP phones, surveillance cameras and portable devices.

      (Video) Day 1:- Live CCNA (Routing & Switching) || Network Kings

Videos

1. CCNA Security 210-260 Complete Exam - Implementing Cisco Network Security - Examtopics.com
(Exam Topics)
2. CCNA 200-301 IN 2 WEEKS! | Final exam prep |
(Tech With Tyler (TWT))
3. Netacad CISCO ITN: How to submit assignments?
(Zeeshan Asghar)
4. 2.4.1.2 Packet Tracer - Skills Integration Challenge with Answers English
(Ultimate Tech Hub)
5. Modules 1 - 4 Switching Concepts VLANs and InterVLAN Routing
(Eng Mohamed Saraya)
6. Modules 16 - 17: Building and Securing a Small Network Exam Answers
(geekofia)
Top Articles
Latest Posts
Article information

Author: Kerri Lueilwitz

Last Updated: 03/03/2023

Views: 5814

Rating: 4.7 / 5 (67 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Kerri Lueilwitz

Birthday: 1992-10-31

Address: Suite 878 3699 Chantelle Roads, Colebury, NC 68599

Phone: +6111989609516

Job: Chief Farming Manager

Hobby: Mycology, Stone skipping, Dowsing, Whittling, Taxidermy, Sand art, Roller skating

Introduction: My name is Kerri Lueilwitz, I am a courageous, gentle, quaint, thankful, outstanding, brave, vast person who loves writing and wants to share my knowledge and understanding with you.