The 7 Things I Know About Cyber Security After 25 Years | April 2024
Q1 On Ch02 Networking Fundamentals
1. Cisco 1 - Networking Basics Chapter 2
LANs were developed to solve which business needs? (Choose three.)
1. reduce duplication of equipment
2. promote the use of sneakernets
3. increase productivity while saving money
4. reduce the number of duplicate copies of files
5. connect users in different geographic locations
6. increase complexity of the work environment
Perrine. J 07/15/09 Page 1
2. Cisco 1 - Networking Basics Chapter 2
LANs were developed to solve which business needs? (Choose three.)
• reduce duplication of equipment
• promote the use of sneakernets
• increase productivity while saving money
• reduce the number of duplicate copies of files
• connect users in different geographic locations
• increase complexity of the work environment
Perrine. J 07/15/09 Page 2
3. Cisco 1 - Networking Basics Chapter 2
Which of the following were disadvantages of electronic bulletin boards?
(Choose 3.)
1. Simultaneous user connections to multiple computers were very fast.
2. Availability was limited to those who knew the location.
3. They did not scale well to keep up with growing demand.
4. Users could not simultaneously share files.
5. Modem and telephone line requirements were demanding.
Perrine. J 07/15/09 Page 3
4. Cisco 1 - Networking Basics Chapter 2
Which of the following were disadvantages of electronic bulletin boards?
(Choose 3.)
• Simultaneous user connections to multiple computers were very fast.
• Availability was limited to those who knew the location.
• They did not scale well to keep up with growing demand.
• Users could not simultaneously share files.
• Modem and telephone line requirements were demanding.
Perrine. J 07/15/09 Page 4
5. Cisco 1 - Networking Basics Chapter 2
Which of the following are LAN design goals? (Choose three)
1. provide full-time connectivity to remote services
2. consolidate network devices and protocols to a single vendor
3. provide access to high-bandwidth media
4. operate within a limited geographic area
5. allow users to share files and printers
6. provide access to geographically separated networks
Perrine. J 07/15/09 Page 5
6. Cisco 1 - Networking Basics Chapter 2
Which of the following are LAN design goals? (Choose three)
• provide full-time connectivity to remote services
• consolidate network devices and protocols to a single vendor
• provide access to high-bandwidth media
• operate within a limited geographic area
• allow users to share files and printers
• provide access to geographically separated networks
Perrine. J 07/15/09 Page 6
7. Cisco 1 - Networking Basics Chapter 2
Which of the following are considered WAN technologies? (Choose three)
1. DSL
2. Ethernet
3. FDDI
4. Frame Relay
5. Modem
6. Token Ring
Perrine. J 07/15/09 Page 7
8. Cisco 1 - Networking Basics Chapter 2
Which of the following are considered WAN technologies? (Choose three)
• DSL
• Ethernet
• FDDI
• Frame Relay
• Modem
• Token Ring
Perrine. J 07/15/09 Page 8
9. Cisco 1 - Networking Basics Chapter 2
Why are networking standards needed?
1. Many networks now cover wide geographic area
2. Technologies must be compatible to allow communication
3. Hardware and software are continually being redesigned
4. LANs, MANs, and WANs use different kinds of equipment.
Perrine. J 07/15/09 Page 9
10. Cisco 1 - Networking Basics Chapter 2
Why are networking standards needed?
• Many networks now cover wide geographic area
• Technologies must be compatible to allow communication
• Hardware and software are continually being redesigned
• LANs, MANs, and WANs use different kinds of equipment.
Perrine. J 07/15/09 Page 10
11. Cisco 1 - Networking Basics Chapter 2
Why did networks experience problems in the mid-1980s?
1. Many new network technologies were incompatible
2. Employees preferred sneaker net
3. Common carriers went bankrupt
4. Everyone used the same hardware and software
Perrine. J 07/15/09 Page 11
12. Cisco 1 - Networking Basics Chapter 2
Why did networks experience problems in the mid-1980s?
• Many new network technologies were incompatible
• Employees preferred sneaker net
• Common carriers went bankrupt
• Everyone used the same hardware and software
Perrine. J 07/15/09 Page 12
13. Cisco 1 - Networking Basics Chapter 2
Which of the following are typical features that determine throughput? (Choose
two.)
1. types of passwords used on servers
2. type of Layer 3 protocol used
3. network topology
4. length of the network cable
5. number of users on the network
Perrine. J 07/15/09 Page 13
14. Cisco 1 - Networking Basics Chapter 2
Which of the following are typical features that determine throughput? (Choose
two.)
• types of passwords used on servers
• type of Layer 3 protocol used
• network topology
• length of the network cable
• number of users on the network
Perrine. J 07/15/09 Page 14
15. Cisco 1 - Networking Basics Chapter 2
Which of the following would be used by a network administrator to calculate
an estimate of network performance? (Choose two.)
1. size of file
2. protocol overhead
3. line bandwidth
4. encapsulation rate
5. bit error rate
Perrine. J 07/15/09 Page 15
16. Cisco 1 - Networking Basics Chapter 2
Which of the following would be used by a network administrator to calculate
an estimate of network performance? (Choose two.)
• size of file
• protocol overhead
• line bandwidth
• encapsulation rate
• bit error rate
Perrine. J 07/15/09 Page 16
17. Cisco 1 - Networking Basics Chapter 2
What is the OSI model?
1. A conceptual framework that specifies how information travels through
networks
2. A model that describes how data makes its way from one application
program to another through a network
3. A conceptual framework that specifies which network functions occur at
each layer
4. All of the above
Perrine. J 07/15/09 Page 17
18. Cisco 1 - Networking Basics Chapter 2
What is the OSI model?
• A conceptual framework that specifies how information travels through
networks
• A model that describes how data makes its way from one application
program to another through a network
• A conceptual framework that specifies which network functions occur at
each layer
• All of the above
Perrine. J 07/15/09 Page 18
19. Cisco 1 - Networking Basics Chapter 2
Which statements describe the network layer of the OSI model in relation to
peer-to-peer communication? (Choose two.)
1. Data is encapsulated and a header is attached creating a packet.
2. Network layer information is encapsulated in a frame.
3. The header contains information required to complete the transfer,
such as source and destination logical addresses.
4. A service is provided to the physical and the application layer of the
OSI model.
5. Data is encapsulated into segments.
6. The header contains no error correction.
Perrine. J 07/15/09 Page 19
20. Cisco 1 - Networking Basics Chapter 2
Which statements describe the network layer of the OSI model in relation to
peer-to-peer communication? (Choose two.)
• Data is encapsulated and a header is attached creating a packet.
• Network layer information is encapsulated in a frame.
• The header contains information required to complete the
transfer, such as source and destination logical addresses.
• A service is provided to the physical and the application layer of the
OSI model.
• Data is encapsulated into segments.
• The header contains no error correction.
Perrine. J 07/15/09 Page 20
21. Cisco 1 - Networking Basics Chapter 2
Which of the following are data link layer encapsulation details? (Choose two.)
1. Packets are put into frames.
2. Data is packaged into a packet.
3. Data is segmented into segments.
4. Data is converted for Internet travel.
5. An address is added to identify the directly connected device.
Perrine. J 07/15/09 Page 21
22. Cisco 1 - Networking Basics Chapter 2
Which of the following are data link layer encapsulation details? (Choose two.)
• Packets are put into frames.
• Data is packaged into a packet.
• Data is segmented into segments.
• Data is converted for Internet travel.
• An address is added to identify the directly connected device.
Perrine. J 07/15/09 Page 22
23. Cisco 1 - Networking Basics Chapter 2
Which of the following terms refers to end-user devices that provide users with a
connection to the network?
1. hub
2. router
3. host
4. server
Perrine. J 07/15/09 Page 23
24. Cisco 1 - Networking Basics Chapter 2
Which of the following terms refers to end-user devices that provide users with a
connection to the network?
• hub
• router
• host
• server
Perrine. J 07/15/09 Page 24
25. Cisco 1 - Networking Basics Chapter 2
Which of the following best defines encapsulation?
1. Segmenting data so that it flows uninterrupted through the network
2. Compressing data so that it moves more quickly
3. Moving data in groups so that it stays together
4. Wrapping of data in a particular protocol header
Perrine. J 07/15/09 Page 25
26. Cisco 1 - Networking Basics Chapter 2
Which of the following best defines encapsulation?
• Segmenting data so that it flows uninterrupted through the network
• Compressing data so that it moves more quickly
• Moving data in groups so that it stays together
• Wrapping of data in a particular protocol header
Perrine. J 07/15/09 Page 26
27. Cisco 1 - Networking Basics Chapter 2
Which of the following physical topologies is used in situations where breaks in
communications are unacceptable?
1. ring
2. star
3. mesh
4. bus
Perrine. J 07/15/09 Page 27
28. Cisco 1 - Networking Basics Chapter 2
Which of the following physical topologies is used in situations where breaks in
communications are unacceptable?
• ring
• star
• mesh
• bus
Perrine. J 07/15/09 Page 28
29. Cisco 1 - Networking Basics Chapter 2
Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable
technologies to securely connect mobile users and telecommuters to branch
office networks?
1. Access VPN
2. Intranet VPN
3. Extranet VPN
4. Shared VPN
Perrine. J 07/15/09 Page 29
30. Cisco 1 - Networking Basics Chapter 2
Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable
technologies to securely connect mobile users and telecommuters to branch
office networks?
• Access VPN
• Intranet VPN
• Extranet VPN
• Shared VPN
Perrine. J 07/15/09 Page 30
31. Cisco 1 - Networking Basics Chapter 2
A contracting company is planning to allow its subcontractors and suppliers
access to its network resources. It desires the security of knowing that the
general public and competitors will not be able to access the information. Which
of the following technologies should the company implement?
1. Access VPN
2. Dial-up VPN
3. Extranet VPN
4. Intranet VPN
5. Secure VPN
6. Wide-Area VPN
Perrine. J 07/15/09 Page 31
32. Cisco 1 - Networking Basics Chapter 2
A contracting company is planning to allow its subcontractors and suppliers
access to its network resources. It desires the security of knowing that the
general public and competitors will not be able to access the information. Which
of the following technologies should the company implement?
• Access VPN
• Dial-up VPN
• Extranet VPN
• Intranet VPN
• Secure VPN
• Wide-Area VPN
Perrine. J 07/15/09 Page 32
33. Cisco 1 - Networking Basics Chapter 2
Which of the following are characteristics that cause bandwidth to vary? (Choose
three.)
1. network technologies used
2. physics of the media
3. application in use
4. signaling methods
5. type of data
Perrine. J 07/15/09 Page 33
34. Cisco 1 - Networking Basics Chapter 2
Which of the following are characteristics that cause bandwidth to vary? (Choose
three.)
• network technologies used
• physics of the media
• application in use
• signaling methods
• type of data
Perrine. J 07/15/09 Page 34
35. Cisco 1 - Networking Basics Chapter 2
Which layer of the OSI model establishes, manages, and terminates
communication between applications?
1. Application
2. Presentation
3. Session
4. Transport
Perrine. J 07/15/09 Page 35
36. Cisco 1 - Networking Basics Chapter 2
Which layer of the OSI model establishes, manages, and terminates
communication between applications?
• Application
• Presentation
• Session
• Transport
Perrine. J 07/15/09 Page 36
37. Cisco 1 - Networking Basics Chapter 2
Which of the following is the approximate amount of time it would take to transmit
a 23.1 megabyte file on a T1 link?
1. fifteen seconds
2. fifteen million seconds
3. one hundred twenty seconds
4. one hundred twenty thousand seconds
Perrine. J 07/15/09 Page 37
38. Cisco 1 - Networking Basics Chapter 2
Which of the following is the approximate amount of time it would take to transmit
a 23.1 megabyte file on a T1 link?
• fifteen seconds
• fifteen million seconds
• one hundred twenty seconds
• one hundred twenty thousand seconds
Perrine. J 07/15/09 Page 38