SlideShare uma empresa Scribd logo
1 de 38
Cisco 1 - Networking Basics                                   Chapter 2




    LANs were developed to solve which business needs? (Choose three.)

             1.   reduce duplication of equipment
             2.   promote the use of sneakernets
             3.   increase productivity while saving money
             4.   reduce the number of duplicate copies of files
             5.   connect users in different geographic locations
             6.   increase complexity of the work environment




Perrine. J                                  07/15/09                      Page 1
Cisco 1 - Networking Basics                                  Chapter 2




    LANs were developed to solve which business needs? (Choose three.)

             •   reduce duplication of equipment
             •   promote the use of sneakernets
             •   increase productivity while saving money
             •   reduce the number of duplicate copies of files
             •   connect users in different geographic locations
             •   increase complexity of the work environment




Perrine. J                                 07/15/09                      Page 2
Cisco 1 - Networking Basics                                     Chapter 2



   Which of the following were disadvantages of electronic bulletin boards?
   (Choose 3.)

             1.   Simultaneous user connections to multiple computers were very fast.
             2.   Availability was limited to those who knew the location.
             3.   They did not scale well to keep up with growing demand.
             4.   Users could not simultaneously share files.
             5.   Modem and telephone line requirements were demanding.




Perrine. J                                   07/15/09                          Page 3
Cisco 1 - Networking Basics                                    Chapter 2



   Which of the following were disadvantages of electronic bulletin boards?
   (Choose 3.)

             •   Simultaneous user connections to multiple computers were very fast.
             •   Availability was limited to those who knew the location.
             •   They did not scale well to keep up with growing demand.
             •   Users could not simultaneously share files.
             •   Modem and telephone line requirements were demanding.




Perrine. J                                 07/15/09                           Page 4
Cisco 1 - Networking Basics                                    Chapter 2



      Which of the following are LAN design goals? (Choose three)

             1.   provide full-time connectivity to remote services
             2.   consolidate network devices and protocols to a single vendor
             3.   provide access to high-bandwidth media
             4.   operate within a limited geographic area
             5.   allow users to share files and printers
             6.   provide access to geographically separated networks




Perrine. J                                  07/15/09                             Page 5
Cisco 1 - Networking Basics                                   Chapter 2



      Which of the following are LAN design goals? (Choose three)

             •   provide full-time connectivity to remote services
             •   consolidate network devices and protocols to a single vendor
             •   provide access to high-bandwidth media
             •   operate within a limited geographic area
             •   allow users to share files and printers
             •   provide access to geographically separated networks




Perrine. J                                 07/15/09                             Page 6
Cisco 1 - Networking Basics                             Chapter 2




      Which of the following are considered WAN technologies? (Choose three)

             1.   DSL
             2.   Ethernet
             3.   FDDI
             4.   Frame Relay
             5.   Modem
             6.   Token Ring




Perrine. J                             07/15/09                          Page 7
Cisco 1 - Networking Basics                             Chapter 2




      Which of the following are considered WAN technologies? (Choose three)

             •   DSL
             •   Ethernet
             •   FDDI
             •   Frame Relay
             •   Modem
             •   Token Ring




Perrine. J                             07/15/09                          Page 8
Cisco 1 - Networking Basics                                  Chapter 2



    Why are networking standards needed?


             1.   Many networks now cover wide geographic area
             2.   Technologies must be compatible to allow communication
             3.   Hardware and software are continually being redesigned
             4.   LANs, MANs, and WANs use different kinds of equipment.




Perrine. J                                  07/15/09                       Page 9
Cisco 1 - Networking Basics                                 Chapter 2



    Why are networking standards needed?


             •   Many networks now cover wide geographic area
             •   Technologies must be compatible to allow communication
             •   Hardware and software are continually being redesigned
             •   LANs, MANs, and WANs use different kinds of equipment.




Perrine. J                                 07/15/09                       Page 10
Cisco 1 - Networking Basics                                Chapter 2




     Why did networks experience problems in the mid-1980s?


             1.   Many new network technologies were incompatible
             2.   Employees preferred sneaker net
             3.   Common carriers went bankrupt
             4.   Everyone used the same hardware and software




Perrine. J                                07/15/09                     Page 11
Cisco 1 - Networking Basics                              Chapter 2




     Why did networks experience problems in the mid-1980s?


             •   Many new network technologies were incompatible
             •   Employees preferred sneaker net
             •   Common carriers went bankrupt
             •   Everyone used the same hardware and software




Perrine. J                               07/15/09                    Page 12
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following are typical features that determine throughput? (Choose
     two.)

             1.   types of passwords used on servers
             2.   type of Layer 3 protocol used
             3.   network topology
             4.   length of the network cable
             5.   number of users on the network




Perrine. J                                  07/15/09                        Page 13
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following are typical features that determine throughput? (Choose
     two.)

             •   types of passwords used on servers
             •   type of Layer 3 protocol used
             •   network topology
             •   length of the network cable
             •   number of users on the network




Perrine. J                                 07/15/09                         Page 14
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following would be used by a network administrator to calculate
     an estimate of network performance? (Choose two.)

             1.   size of file
             2.   protocol overhead
             3.   line bandwidth
             4.   encapsulation rate
             5.   bit error rate




Perrine. J                              07/15/09                            Page 15
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following would be used by a network administrator to calculate
     an estimate of network performance? (Choose two.)

             •   size of file
             •   protocol overhead
             •   line bandwidth
             •   encapsulation rate
             •   bit error rate




Perrine. J                              07/15/09                            Page 16
Cisco 1 - Networking Basics                                  Chapter 2




      What is the OSI model?


             1.   A conceptual framework that specifies how information travels through
                  networks
             2.   A model that describes how data makes its way from one application
                  program to another through a network
             3.   A conceptual framework that specifies which network functions occur at
                  each layer
             4.   All of the above




Perrine. J                                 07/15/09                            Page 17
Cisco 1 - Networking Basics                                 Chapter 2




      What is the OSI model?


             •   A conceptual framework that specifies how information travels through
                 networks
             •   A model that describes how data makes its way from one application
                 program to another through a network
             •   A conceptual framework that specifies which network functions occur at
                 each layer
             •   All of the above




Perrine. J                                07/15/09                            Page 18
Cisco 1 - Networking Basics                                    Chapter 2




      Which statements describe the network layer of the OSI model in relation to
          peer-to-peer communication? (Choose two.)

             1.   Data is encapsulated and a header is attached creating a packet.
             2.   Network layer information is encapsulated in a frame.
             3.   The header contains information required to complete the transfer,
                  such as source and destination logical addresses.
             4.   A service is provided to the physical and the application layer of the
                  OSI model.
             5.   Data is encapsulated into segments.
             6.   The header contains no error correction.




Perrine. J                                  07/15/09                              Page 19
Cisco 1 - Networking Basics                                   Chapter 2




      Which statements describe the network layer of the OSI model in relation to
          peer-to-peer communication? (Choose two.)

             •   Data is encapsulated and a header is attached creating a packet.
             •   Network layer information is encapsulated in a frame.
             •   The header contains information required to complete the
                 transfer, such as source and destination logical addresses.
             •   A service is provided to the physical and the application layer of the
                 OSI model.
             •   Data is encapsulated into segments.
             •   The header contains no error correction.




Perrine. J                                 07/15/09                              Page 20
Cisco 1 - Networking Basics                                 Chapter 2




        Which of the following are data link layer encapsulation details? (Choose two.)

             1.   Packets are put into frames.
             2.   Data is packaged into a packet.
             3.   Data is segmented into segments.
             4.   Data is converted for Internet travel.
             5.   An address is added to identify the directly connected device.




Perrine. J                                 07/15/09                            Page 21
Cisco 1 - Networking Basics                                Chapter 2




        Which of the following are data link layer encapsulation details? (Choose two.)

             •   Packets are put into frames.
             •   Data is packaged into a packet.
             •   Data is segmented into segments.
             •   Data is converted for Internet travel.
             •   An address is added to identify the directly connected device.




Perrine. J                                07/15/09                            Page 22
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following terms refers to end-user devices that provide users with a
     connection to the network?

              1.   hub
              2.   router
              3.   host
              4.   server




Perrine. J                              07/15/09                             Page 23
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following terms refers to end-user devices that provide users with a
     connection to the network?

              •   hub
              •   router
              •   host
              •   server




Perrine. J                              07/15/09                             Page 24
Cisco 1 - Networking Basics                                    Chapter 2



     Which of the following best defines encapsulation?


             1.   Segmenting data so that it flows uninterrupted through the network
             2.   Compressing data so that it moves more quickly
             3.   Moving data in groups so that it stays together
             4.   Wrapping of data in a particular protocol header




Perrine. J                                  07/15/09                            Page 25
Cisco 1 - Networking Basics                                   Chapter 2



     Which of the following best defines encapsulation?


             •   Segmenting data so that it flows uninterrupted through the network
             •   Compressing data so that it moves more quickly
             •   Moving data in groups so that it stays together
             •   Wrapping of data in a particular protocol header




Perrine. J                                 07/15/09                            Page 26
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following physical topologies is used in situations where breaks in
     communications are unacceptable?

               1.   ring
               2.   star
               3.   mesh
               4.   bus




Perrine. J                               07/15/09                             Page 27
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following physical topologies is used in situations where breaks in
     communications are unacceptable?

               •    ring
               •    star
               •    mesh
               •    bus




Perrine. J                               07/15/09                             Page 28
Cisco 1 - Networking Basics                              Chapter 2




       Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable
       technologies to securely connect mobile users and telecommuters to branch
       office networks?

             1.   Access VPN
             2.   Intranet VPN
             3.   Extranet VPN
             4.   Shared VPN




Perrine. J                             07/15/09                           Page 29
Cisco 1 - Networking Basics                              Chapter 2




       Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable
       technologies to securely connect mobile users and telecommuters to branch
       office networks?

             •   Access VPN
             •   Intranet VPN
             •   Extranet VPN
             •   Shared VPN




Perrine. J                             07/15/09                           Page 30
Cisco 1 - Networking Basics                               Chapter 2




     A contracting company is planning to allow its subcontractors and suppliers
     access to its network resources. It desires the security of knowing that the
     general public and competitors will not be able to access the information. Which
     of the following technologies should the company implement?

             1.   Access VPN
             2.   Dial-up VPN
             3.   Extranet VPN
             4.   Intranet VPN
             5.   Secure VPN
             6.   Wide-Area VPN




Perrine. J                              07/15/09                             Page 31
Cisco 1 - Networking Basics                               Chapter 2




     A contracting company is planning to allow its subcontractors and suppliers
     access to its network resources. It desires the security of knowing that the
     general public and competitors will not be able to access the information. Which
     of the following technologies should the company implement?

             •   Access VPN
             •   Dial-up VPN
             •   Extranet VPN
             •   Intranet VPN
             •   Secure VPN
             •   Wide-Area VPN




Perrine. J                              07/15/09                             Page 32
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following are characteristics that cause bandwidth to vary? (Choose
     three.)

             1.   network technologies used
             2.   physics of the media
             3.   application in use
             4.   signaling methods
             5.   type of data




Perrine. J                                07/15/09                          Page 33
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following are characteristics that cause bandwidth to vary? (Choose
     three.)

             •   network technologies used
             •   physics of the media
             •   application in use
             •   signaling methods
             •   type of data




Perrine. J                              07/15/09                            Page 34
Cisco 1 - Networking Basics                             Chapter 2




       Which layer of the OSI model establishes, manages, and terminates
           communication between applications?


             1.   Application
             2.   Presentation
             3.   Session
             4.   Transport




Perrine. J                             07/15/09                            Page 35
Cisco 1 - Networking Basics                             Chapter 2




       Which layer of the OSI model establishes, manages, and terminates
           communication between applications?


             •   Application
             •   Presentation
             •   Session
             •   Transport




Perrine. J                             07/15/09                            Page 36
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following is the approximate amount of time it would take to transmit
     a 23.1 megabyte file on a T1 link?

             1.   fifteen seconds
             2.   fifteen million seconds
             3.   one hundred twenty seconds
             4.   one hundred twenty thousand seconds




Perrine. J                                  07/15/09                         Page 37
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following is the approximate amount of time it would take to transmit
     a 23.1 megabyte file on a T1 link?

             •   fifteen seconds
             •   fifteen million seconds
             •   one hundred twenty seconds
             •   one hundred twenty thousand seconds




Perrine. J                                 07/15/09                          Page 38

Mais conteúdo relacionado

Mais procurados (20)

Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Basic Computer Network
Basic Computer Network Basic Computer Network
Basic Computer Network
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Computer Networks workshop
Computer Networks workshopComputer Networks workshop
Computer Networks workshop
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt download
 
Chapter 1 v n.2
Chapter 1 v n.2Chapter 1 v n.2
Chapter 1 v n.2
 
Computer networks--osi model
Computer networks--osi modelComputer networks--osi model
Computer networks--osi model
 
Networks
NetworksNetworks
Networks
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
 
Acem lan
Acem lanAcem lan
Acem lan
 
Basics Of Comuter Networking
Basics Of Comuter NetworkingBasics Of Comuter Networking
Basics Of Comuter Networking
 
Computer networks
Computer networksComputer networks
Computer networks
 
Data Communication
Data Communication Data Communication
Data Communication
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
local area network
 local area network local area network
local area network
 
Types of Networks
Types of NetworksTypes of Networks
Types of Networks
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Computer networks
Computer networksComputer networks
Computer networks
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
 

Semelhante a Q1 On Ch02 Networking Fundamentals

Q1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet SwitchingQ1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet Switchingjerometnewman
 
Q1 On Ch07 Ethernet Technologies
Q1 On Ch07 Ethernet TechnologiesQ1 On Ch07 Ethernet Technologies
Q1 On Ch07 Ethernet Technologiesjerometnewman
 
Q1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa NsQ1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa Nsjerometnewman
 
Q1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To NetworkingQ1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To Networkingjerometnewman
 
Q1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And SubnetsQ1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And Subnetsjerometnewman
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdfSherefHesham
 
12110 computer networks
12110 computer networks12110 computer networks
12110 computer networksGaurang Thakar
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsGuru Ji
 
Network Protocol
Network ProtocolNetwork Protocol
Network ProtocolKetan Nayak
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxGambari Amosa Isiaka
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to networkMiz Malinz
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationJisc
 
Layer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptLayer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptBeniamTekeste
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2ifrieshe
 

Semelhante a Q1 On Ch02 Networking Fundamentals (20)

Q1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet SwitchingQ1 On Ch08 Ethernet Switching
Q1 On Ch08 Ethernet Switching
 
Q1 On Ch07 Ethernet Technologies
Q1 On Ch07 Ethernet TechnologiesQ1 On Ch07 Ethernet Technologies
Q1 On Ch07 Ethernet Technologies
 
Q1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa NsQ1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch05 Cabling La Ns And Wa Ns
 
Q1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To NetworkingQ1 On Ch01 Introduction To Networking
Q1 On Ch01 Introduction To Networking
 
VOICE
VOICEVOICE
VOICE
 
Q1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And SubnetsQ1 On Ch10 Routing Fundamentals And Subnets
Q1 On Ch10 Routing Fundamentals And Subnets
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
BACKBONE NETWORKS
BACKBONE NETWORKSBACKBONE NETWORKS
BACKBONE NETWORKS
 
12110 computer networks
12110 computer networks12110 computer networks
12110 computer networks
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network Concepts
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
Networking
NetworkingNetworking
Networking
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptx
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to network
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentation
 
Layer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptLayer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.ppt
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2
 
Smart x
Smart xSmart x
Smart x
 
Fe4
Fe4Fe4
Fe4
 

Mais de jerometnewman

Q1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application LayerQ1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application Layerjerometnewman
 
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip AddressingQ1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressingjerometnewman
 
Q1 On Ch04 Cable Testing
Q1 On Ch04 Cable TestingQ1 On Ch04 Cable Testing
Q1 On Ch04 Cable Testingjerometnewman
 
Q1 On Ch03 Networking Media
Q1 On Ch03 Networking MediaQ1 On Ch03 Networking Media
Q1 On Ch03 Networking Mediajerometnewman
 

Mais de jerometnewman (6)

Q1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application LayerQ1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application Layer
 
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip AddressingQ1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
 
Q1 On Ch04 Cable Testing
Q1 On Ch04 Cable TestingQ1 On Ch04 Cable Testing
Q1 On Ch04 Cable Testing
 
Q1 On Ch03 Networking Media
Q1 On Ch03 Networking MediaQ1 On Ch03 Networking Media
Q1 On Ch03 Networking Media
 
Certs
CertsCerts
Certs
 
Dell Certs
Dell CertsDell Certs
Dell Certs
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Q1 On Ch02 Networking Fundamentals

  • 1. Cisco 1 - Networking Basics Chapter 2 LANs were developed to solve which business needs? (Choose three.) 1. reduce duplication of equipment 2. promote the use of sneakernets 3. increase productivity while saving money 4. reduce the number of duplicate copies of files 5. connect users in different geographic locations 6. increase complexity of the work environment Perrine. J 07/15/09 Page 1
  • 2. Cisco 1 - Networking Basics Chapter 2 LANs were developed to solve which business needs? (Choose three.) • reduce duplication of equipment • promote the use of sneakernets • increase productivity while saving money • reduce the number of duplicate copies of files • connect users in different geographic locations • increase complexity of the work environment Perrine. J 07/15/09 Page 2
  • 3. Cisco 1 - Networking Basics Chapter 2 Which of the following were disadvantages of electronic bulletin boards? (Choose 3.) 1. Simultaneous user connections to multiple computers were very fast. 2. Availability was limited to those who knew the location. 3. They did not scale well to keep up with growing demand. 4. Users could not simultaneously share files. 5. Modem and telephone line requirements were demanding. Perrine. J 07/15/09 Page 3
  • 4. Cisco 1 - Networking Basics Chapter 2 Which of the following were disadvantages of electronic bulletin boards? (Choose 3.) • Simultaneous user connections to multiple computers were very fast. • Availability was limited to those who knew the location. • They did not scale well to keep up with growing demand. • Users could not simultaneously share files. • Modem and telephone line requirements were demanding. Perrine. J 07/15/09 Page 4
  • 5. Cisco 1 - Networking Basics Chapter 2 Which of the following are LAN design goals? (Choose three) 1. provide full-time connectivity to remote services 2. consolidate network devices and protocols to a single vendor 3. provide access to high-bandwidth media 4. operate within a limited geographic area 5. allow users to share files and printers 6. provide access to geographically separated networks Perrine. J 07/15/09 Page 5
  • 6. Cisco 1 - Networking Basics Chapter 2 Which of the following are LAN design goals? (Choose three) • provide full-time connectivity to remote services • consolidate network devices and protocols to a single vendor • provide access to high-bandwidth media • operate within a limited geographic area • allow users to share files and printers • provide access to geographically separated networks Perrine. J 07/15/09 Page 6
  • 7. Cisco 1 - Networking Basics Chapter 2 Which of the following are considered WAN technologies? (Choose three) 1. DSL 2. Ethernet 3. FDDI 4. Frame Relay 5. Modem 6. Token Ring Perrine. J 07/15/09 Page 7
  • 8. Cisco 1 - Networking Basics Chapter 2 Which of the following are considered WAN technologies? (Choose three) • DSL • Ethernet • FDDI • Frame Relay • Modem • Token Ring Perrine. J 07/15/09 Page 8
  • 9. Cisco 1 - Networking Basics Chapter 2 Why are networking standards needed? 1. Many networks now cover wide geographic area 2. Technologies must be compatible to allow communication 3. Hardware and software are continually being redesigned 4. LANs, MANs, and WANs use different kinds of equipment. Perrine. J 07/15/09 Page 9
  • 10. Cisco 1 - Networking Basics Chapter 2 Why are networking standards needed? • Many networks now cover wide geographic area • Technologies must be compatible to allow communication • Hardware and software are continually being redesigned • LANs, MANs, and WANs use different kinds of equipment. Perrine. J 07/15/09 Page 10
  • 11. Cisco 1 - Networking Basics Chapter 2 Why did networks experience problems in the mid-1980s? 1. Many new network technologies were incompatible 2. Employees preferred sneaker net 3. Common carriers went bankrupt 4. Everyone used the same hardware and software Perrine. J 07/15/09 Page 11
  • 12. Cisco 1 - Networking Basics Chapter 2 Why did networks experience problems in the mid-1980s? • Many new network technologies were incompatible • Employees preferred sneaker net • Common carriers went bankrupt • Everyone used the same hardware and software Perrine. J 07/15/09 Page 12
  • 13. Cisco 1 - Networking Basics Chapter 2 Which of the following are typical features that determine throughput? (Choose two.) 1. types of passwords used on servers 2. type of Layer 3 protocol used 3. network topology 4. length of the network cable 5. number of users on the network Perrine. J 07/15/09 Page 13
  • 14. Cisco 1 - Networking Basics Chapter 2 Which of the following are typical features that determine throughput? (Choose two.) • types of passwords used on servers • type of Layer 3 protocol used • network topology • length of the network cable • number of users on the network Perrine. J 07/15/09 Page 14
  • 15. Cisco 1 - Networking Basics Chapter 2 Which of the following would be used by a network administrator to calculate an estimate of network performance? (Choose two.) 1. size of file 2. protocol overhead 3. line bandwidth 4. encapsulation rate 5. bit error rate Perrine. J 07/15/09 Page 15
  • 16. Cisco 1 - Networking Basics Chapter 2 Which of the following would be used by a network administrator to calculate an estimate of network performance? (Choose two.) • size of file • protocol overhead • line bandwidth • encapsulation rate • bit error rate Perrine. J 07/15/09 Page 16
  • 17. Cisco 1 - Networking Basics Chapter 2 What is the OSI model? 1. A conceptual framework that specifies how information travels through networks 2. A model that describes how data makes its way from one application program to another through a network 3. A conceptual framework that specifies which network functions occur at each layer 4. All of the above Perrine. J 07/15/09 Page 17
  • 18. Cisco 1 - Networking Basics Chapter 2 What is the OSI model? • A conceptual framework that specifies how information travels through networks • A model that describes how data makes its way from one application program to another through a network • A conceptual framework that specifies which network functions occur at each layer • All of the above Perrine. J 07/15/09 Page 18
  • 19. Cisco 1 - Networking Basics Chapter 2 Which statements describe the network layer of the OSI model in relation to peer-to-peer communication? (Choose two.) 1. Data is encapsulated and a header is attached creating a packet. 2. Network layer information is encapsulated in a frame. 3. The header contains information required to complete the transfer, such as source and destination logical addresses. 4. A service is provided to the physical and the application layer of the OSI model. 5. Data is encapsulated into segments. 6. The header contains no error correction. Perrine. J 07/15/09 Page 19
  • 20. Cisco 1 - Networking Basics Chapter 2 Which statements describe the network layer of the OSI model in relation to peer-to-peer communication? (Choose two.) • Data is encapsulated and a header is attached creating a packet. • Network layer information is encapsulated in a frame. • The header contains information required to complete the transfer, such as source and destination logical addresses. • A service is provided to the physical and the application layer of the OSI model. • Data is encapsulated into segments. • The header contains no error correction. Perrine. J 07/15/09 Page 20
  • 21. Cisco 1 - Networking Basics Chapter 2 Which of the following are data link layer encapsulation details? (Choose two.) 1. Packets are put into frames. 2. Data is packaged into a packet. 3. Data is segmented into segments. 4. Data is converted for Internet travel. 5. An address is added to identify the directly connected device. Perrine. J 07/15/09 Page 21
  • 22. Cisco 1 - Networking Basics Chapter 2 Which of the following are data link layer encapsulation details? (Choose two.) • Packets are put into frames. • Data is packaged into a packet. • Data is segmented into segments. • Data is converted for Internet travel. • An address is added to identify the directly connected device. Perrine. J 07/15/09 Page 22
  • 23. Cisco 1 - Networking Basics Chapter 2 Which of the following terms refers to end-user devices that provide users with a connection to the network? 1. hub 2. router 3. host 4. server Perrine. J 07/15/09 Page 23
  • 24. Cisco 1 - Networking Basics Chapter 2 Which of the following terms refers to end-user devices that provide users with a connection to the network? • hub • router • host • server Perrine. J 07/15/09 Page 24
  • 25. Cisco 1 - Networking Basics Chapter 2 Which of the following best defines encapsulation? 1. Segmenting data so that it flows uninterrupted through the network 2. Compressing data so that it moves more quickly 3. Moving data in groups so that it stays together 4. Wrapping of data in a particular protocol header Perrine. J 07/15/09 Page 25
  • 26. Cisco 1 - Networking Basics Chapter 2 Which of the following best defines encapsulation? • Segmenting data so that it flows uninterrupted through the network • Compressing data so that it moves more quickly • Moving data in groups so that it stays together • Wrapping of data in a particular protocol header Perrine. J 07/15/09 Page 26
  • 27. Cisco 1 - Networking Basics Chapter 2 Which of the following physical topologies is used in situations where breaks in communications are unacceptable? 1. ring 2. star 3. mesh 4. bus Perrine. J 07/15/09 Page 27
  • 28. Cisco 1 - Networking Basics Chapter 2 Which of the following physical topologies is used in situations where breaks in communications are unacceptable? • ring • star • mesh • bus Perrine. J 07/15/09 Page 28
  • 29. Cisco 1 - Networking Basics Chapter 2 Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable technologies to securely connect mobile users and telecommuters to branch office networks? 1. Access VPN 2. Intranet VPN 3. Extranet VPN 4. Shared VPN Perrine. J 07/15/09 Page 29
  • 30. Cisco 1 - Networking Basics Chapter 2 Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable technologies to securely connect mobile users and telecommuters to branch office networks? • Access VPN • Intranet VPN • Extranet VPN • Shared VPN Perrine. J 07/15/09 Page 30
  • 31. Cisco 1 - Networking Basics Chapter 2 A contracting company is planning to allow its subcontractors and suppliers access to its network resources. It desires the security of knowing that the general public and competitors will not be able to access the information. Which of the following technologies should the company implement? 1. Access VPN 2. Dial-up VPN 3. Extranet VPN 4. Intranet VPN 5. Secure VPN 6. Wide-Area VPN Perrine. J 07/15/09 Page 31
  • 32. Cisco 1 - Networking Basics Chapter 2 A contracting company is planning to allow its subcontractors and suppliers access to its network resources. It desires the security of knowing that the general public and competitors will not be able to access the information. Which of the following technologies should the company implement? • Access VPN • Dial-up VPN • Extranet VPN • Intranet VPN • Secure VPN • Wide-Area VPN Perrine. J 07/15/09 Page 32
  • 33. Cisco 1 - Networking Basics Chapter 2 Which of the following are characteristics that cause bandwidth to vary? (Choose three.) 1. network technologies used 2. physics of the media 3. application in use 4. signaling methods 5. type of data Perrine. J 07/15/09 Page 33
  • 34. Cisco 1 - Networking Basics Chapter 2 Which of the following are characteristics that cause bandwidth to vary? (Choose three.) • network technologies used • physics of the media • application in use • signaling methods • type of data Perrine. J 07/15/09 Page 34
  • 35. Cisco 1 - Networking Basics Chapter 2 Which layer of the OSI model establishes, manages, and terminates communication between applications? 1. Application 2. Presentation 3. Session 4. Transport Perrine. J 07/15/09 Page 35
  • 36. Cisco 1 - Networking Basics Chapter 2 Which layer of the OSI model establishes, manages, and terminates communication between applications? • Application • Presentation • Session • Transport Perrine. J 07/15/09 Page 36
  • 37. Cisco 1 - Networking Basics Chapter 2 Which of the following is the approximate amount of time it would take to transmit a 23.1 megabyte file on a T1 link? 1. fifteen seconds 2. fifteen million seconds 3. one hundred twenty seconds 4. one hundred twenty thousand seconds Perrine. J 07/15/09 Page 37
  • 38. Cisco 1 - Networking Basics Chapter 2 Which of the following is the approximate amount of time it would take to transmit a 23.1 megabyte file on a T1 link? • fifteen seconds • fifteen million seconds • one hundred twenty seconds • one hundred twenty thousand seconds Perrine. J 07/15/09 Page 38