SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
ccnav5.org http://ccnav5.org/ccna-1-chapter-1-v5-0-2014-exam-answers-2/
CCNAV5.Org
CCNAv5.Org
CCNA 1 Chapter 1 v5.0 2014 Exam Answers
1. Which two Internet solutions provide an always-on, high-bandwidth connection to
computers on a LAN? (Choose two.)
cellular
DSL
satellite
cable
dial-up telephone
2. What type of network must a home user access in order to do online shopping?
a local area network
the Internet
an extranet
an intranet
3. What are two functions of intermediary devices on a network? (Choose two.)
They are the primary source and providers of information and services to end devices.
They form the interface between the human network and the underlying communication network.
They direct data along alternate pathways when there is a link failure.
They run applications that support collaboration for business.
They filter the flow of data, based on security settings.
4. Fill in the blank.
The acronym “BYOD” refers to the trend of end users being able to use their personal devices to access the business network
and resources.
5. Which description correctly defines a converged network?
a network that allows users to interact directly with each other over multiple channels
a network that is limited to exchanging character-based information
a dedicated network with separate channels for video and voice services
a single network channel capable of delivering multiple communication forms
6.
Drag and drop
Match each characteristic to its corresponding internet conectivity type.
satellite -> Not suited for heavily wooded areas
dialup telephone -> typically has very low bandwidth
DSL -> splits the access line into three signals
cable -> uses coaxial cable as a medium
7.
Drag and drop
Match the form of network communication with its description.
Web pages that groups of people can edit and view together -> wiki
Interactive websites where people created and share user-generated content with friends and family -> Social media
real-time communication of between two or more people -> instant messaging
an audio-based medium that allows people to deliver their recordings to a wide audience -> podcast
8. Drag and drop
Match each definition to the corresponding security goal:
maintaining integrity -> the assurance that the information has not been altered during transmission
ensuring confidentiality -> only the intended recipients can access and read the data
ensuring availability -> the assurance of timely and reliable access to data
9. Which statement describes a characteristic of cloud computing?
A business can connect directly to the Internet without the use of an ISP.
Devices can connect to the Internet through existing electrical wiring.
Investment in new infrastructure is required in order to access the cloud.
Applications can be accessed over the Internet through a subscription.
10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
cellular
dialup
satellite
DSL
dedicated leased line
11. What is a characteristic of circuit-switched networks?
A single message can be broken into multiple message blocks that are transmitted through multiple circuits simultaneously.
If all circuits are busy, a new call cannot be placed.
If a circuit fails, the call will be forwarded on a new path.
Circuit-switched networks can dynamically learn and use redundant circuits.
12. Requiring strong, complex passwords is a practice that supports which network security goal?
maintaining communication integrity
ensuring redundancy
ensuring data confidentiality
ensuring reliability of access
13. What two criteria are used to help select network media? (Choose two.)
the distance the media can successfully carry a signal
the environment where the media is to be installed
the cost of the end devices utilized in the network
the number of intermediary devices installed in the network
the types of data that need to be prioritized
14. Which statement describes a network that supports QoS?
Data sent over the network is not altered in transmission.
The fewest possible devices are affected by a failure.
The network provides predictable levels of service to different types of traffic.
The network should be able to expand to keep up with user demand.
15.
Refer to the exhibit. Which set of devices contains only intermediary devices?
A, B, E, F
A, B, D, G
G, H, I, J
C, D, G, I
16. Which device performs the function of determining the path that messages should take through internetworks?
a web server
a DSL modem
a router
a firewall
17. Which tool provides real-time video and audio communication over the Internet so that businesses can conduct
corporate meetings with participants from several remote locations?
wiki
instant messaging
weblog
TelePresence
18. Which two statements about the relationship between LANs and WANs are true? (Choose two.)
Both LANs and WANs connect end devices.
WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or
individuals.
WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.
The Internet is a WAN.
WANs must be publicly-owned, but LANs can be owned by either public or private entities.
19. Which three network tools provide the minimum required security protection for home users? (Choose three.)
antivirus software
antispyware software
an intrusion prevention system
powerline networking
a firewall
access control lists
20. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students
bringing their own tablets and smartphones to school to access school resources?
intranet
wired LAN
wireless LAN
extranet
wireless WAN
21. Which expression accurately defines the term congestion?
a method of limiting the impact of a hardware or software failure on the network
a set of techniques to manage the utilization of network resources
a state where the demand on the network resources exceeds the available capacity
a measure of the data carrying capacity of the network

Mais conteúdo relacionado

Mais procurados

Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkIOSR Journals
 
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODSPSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODSIJNSA Journal
 
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...CSCJournals
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceTransweb Global Inc
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)Mehar Arslan
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYKak Yong
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 networkRana Muzffar
 

Mais procurados (8)

The mfn 3
The mfn 3The mfn 3
The mfn 3
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODSPSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
 
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer Science
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 network
 

Semelhante a CCNA 1 Chapter 1 v5.0 2014

Examen Cisco Yesica Cañaveral
Examen Cisco Yesica Cañaveral Examen Cisco Yesica Cañaveral
Examen Cisco Yesica Cañaveral Once Redes
 
Examen cisco eliana galeano
Examen cisco eliana galeano Examen cisco eliana galeano
Examen cisco eliana galeano Once Redes
 
Examen cisco mariana
Examen cisco marianaExamen cisco mariana
Examen cisco marianaOnce Redes
 
Examen cisco laura garcia
Examen cisco laura garciaExamen cisco laura garcia
Examen cisco laura garciaOnce Redes
 
Examen cisco (1)
Examen cisco (1)Examen cisco (1)
Examen cisco (1)Once Redes
 
Examen cisco Alysson
Examen cisco Alysson Examen cisco Alysson
Examen cisco Alysson Once Redes
 
Examen cisco Yaissa Gómez
Examen cisco Yaissa GómezExamen cisco Yaissa Gómez
Examen cisco Yaissa GómezOnce Redes
 
Examen cisco - Jocelyne Toro Osorio
Examen cisco - Jocelyne Toro OsorioExamen cisco - Jocelyne Toro Osorio
Examen cisco - Jocelyne Toro OsorioOnce Redes
 
Examen cisco-Alejandra Zabala
Examen cisco-Alejandra ZabalaExamen cisco-Alejandra Zabala
Examen cisco-Alejandra ZabalaOnce Redes
 
Examen cisco (2)
Examen cisco (2)Examen cisco (2)
Examen cisco (2)Once Redes
 
Eidws 108 networks
Eidws 108 networksEidws 108 networks
Eidws 108 networksIT2Alcorn
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networksAlidHasan4
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

Semelhante a CCNA 1 Chapter 1 v5.0 2014 (20)

Examen cisco
Examen ciscoExamen cisco
Examen cisco
 
Examen Cisco Yesica Cañaveral
Examen Cisco Yesica Cañaveral Examen Cisco Yesica Cañaveral
Examen Cisco Yesica Cañaveral
 
Examen cisco eliana galeano
Examen cisco eliana galeano Examen cisco eliana galeano
Examen cisco eliana galeano
 
Examen cisco mariana
Examen cisco marianaExamen cisco mariana
Examen cisco mariana
 
Examen cisco laura garcia
Examen cisco laura garciaExamen cisco laura garcia
Examen cisco laura garcia
 
Examen cisco
Examen ciscoExamen cisco
Examen cisco
 
Examen cisco (1)
Examen cisco (1)Examen cisco (1)
Examen cisco (1)
 
Examen cisco Alysson
Examen cisco Alysson Examen cisco Alysson
Examen cisco Alysson
 
Examen cisco
Examen ciscoExamen cisco
Examen cisco
 
Examen cisco Yaissa Gómez
Examen cisco Yaissa GómezExamen cisco Yaissa Gómez
Examen cisco Yaissa Gómez
 
Examen cisco - Jocelyne Toro Osorio
Examen cisco - Jocelyne Toro OsorioExamen cisco - Jocelyne Toro Osorio
Examen cisco - Jocelyne Toro Osorio
 
Examen cisco-Alejandra Zabala
Examen cisco-Alejandra ZabalaExamen cisco-Alejandra Zabala
Examen cisco-Alejandra Zabala
 
Examen cisco (2)
Examen cisco (2)Examen cisco (2)
Examen cisco (2)
 
Eidws 108 networks
Eidws 108 networksEidws 108 networks
Eidws 108 networks
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
H010524049
H010524049H010524049
H010524049
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

Mais de Đồng Quốc Vương

Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examĐồng Quốc Vương
 
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014Đồng Quốc Vương
 
Ccnav5.org ccna 3-chapter_8_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_8_v50_2014_exam_answersCcnav5.org ccna 3-chapter_8_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_8_v50_2014_exam_answersĐồng Quốc Vương
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersĐồng Quốc Vương
 
Ccnav5.org ccna 4-v5_practice_skills_assessment__packet_tracer
Ccnav5.org ccna 4-v5_practice_skills_assessment__packet_tracerCcnav5.org ccna 4-v5_practice_skills_assessment__packet_tracer
Ccnav5.org ccna 4-v5_practice_skills_assessment__packet_tracerĐồng Quốc Vương
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersĐồng Quốc Vương
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersĐồng Quốc Vương
 

Mais de Đồng Quốc Vương (20)

Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014
 
Ccnav5.org ccna 3-v50_final_exam_2014
Ccnav5.org ccna 3-v50_final_exam_2014Ccnav5.org ccna 3-v50_final_exam_2014
Ccnav5.org ccna 3-v50_final_exam_2014
 
Ccnav5.org ccna 3-chapter_8_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_8_v50_2014_exam_answersCcnav5.org ccna 3-chapter_8_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_8_v50_2014_exam_answers
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
 
Ccnav5.org ccna 2-v5_final_exam_2014
Ccnav5.org ccna 2-v5_final_exam_2014Ccnav5.org ccna 2-v5_final_exam_2014
Ccnav5.org ccna 2-v5_final_exam_2014
 
Ccnav5.org ccna 3-exam_2014
Ccnav5.org ccna 3-exam_2014Ccnav5.org ccna 3-exam_2014
Ccnav5.org ccna 3-exam_2014
 
Ccnav5.org ccna 4-v5_practice_skills_assessment__packet_tracer
Ccnav5.org ccna 4-v5_practice_skills_assessment__packet_tracerCcnav5.org ccna 4-v5_practice_skills_assessment__packet_tracer
Ccnav5.org ccna 4-v5_practice_skills_assessment__packet_tracer
 
Ccna 2 chapter 11 2014 v5
Ccna 2 chapter 11 2014 v5Ccna 2 chapter 11 2014 v5
Ccna 2 chapter 11 2014 v5
 
Ccna 2 chapter 1 2014 v5
Ccna 2 chapter 1 2014 v5Ccna 2 chapter 1 2014 v5
Ccna 2 chapter 1 2014 v5
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answers
 
CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014
 
CCNA 1 Chapter 7 v5.0 2014
CCNA 1 Chapter 7 v5.0 2014CCNA 1 Chapter 7 v5.0 2014
CCNA 1 Chapter 7 v5.0 2014
 
CCNA 1 Chapter 6 v5.0 2014
CCNA 1 Chapter 6 v5.0 2014CCNA 1 Chapter 6 v5.0 2014
CCNA 1 Chapter 6 v5.0 2014
 
CCNA 1 Chapter 5 v5.0 2014
CCNA 1 Chapter 5 v5.0 2014CCNA 1 Chapter 5 v5.0 2014
CCNA 1 Chapter 5 v5.0 2014
 
CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014
 
CCNA 1 Chapter 10 v5.0 2014
CCNA 1 Chapter 10 v5.0 2014CCNA 1 Chapter 10 v5.0 2014
CCNA 1 Chapter 10 v5.0 2014
 
CCNA 1 Final v5.0 2014
CCNA 1 Final  v5.0 2014CCNA 1 Final  v5.0 2014
CCNA 1 Final v5.0 2014
 
Ccnav5.org ccna 1-exam_2014
Ccnav5.org ccna 1-exam_2014Ccnav5.org ccna 1-exam_2014
Ccnav5.org ccna 1-exam_2014
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
 

Último

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Último (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

CCNA 1 Chapter 1 v5.0 2014

  • 1. ccnav5.org http://ccnav5.org/ccna-1-chapter-1-v5-0-2014-exam-answers-2/ CCNAV5.Org CCNAv5.Org CCNA 1 Chapter 1 v5.0 2014 Exam Answers 1. Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.) cellular DSL satellite cable dial-up telephone 2. What type of network must a home user access in order to do online shopping? a local area network the Internet an extranet an intranet 3. What are two functions of intermediary devices on a network? (Choose two.) They are the primary source and providers of information and services to end devices. They form the interface between the human network and the underlying communication network. They direct data along alternate pathways when there is a link failure. They run applications that support collaboration for business. They filter the flow of data, based on security settings. 4. Fill in the blank. The acronym “BYOD” refers to the trend of end users being able to use their personal devices to access the business network and resources. 5. Which description correctly defines a converged network? a network that allows users to interact directly with each other over multiple channels a network that is limited to exchanging character-based information a dedicated network with separate channels for video and voice services a single network channel capable of delivering multiple communication forms 6. Drag and drop Match each characteristic to its corresponding internet conectivity type. satellite -> Not suited for heavily wooded areas dialup telephone -> typically has very low bandwidth
  • 2. DSL -> splits the access line into three signals cable -> uses coaxial cable as a medium 7. Drag and drop Match the form of network communication with its description. Web pages that groups of people can edit and view together -> wiki Interactive websites where people created and share user-generated content with friends and family -> Social media real-time communication of between two or more people -> instant messaging an audio-based medium that allows people to deliver their recordings to a wide audience -> podcast 8. Drag and drop Match each definition to the corresponding security goal: maintaining integrity -> the assurance that the information has not been altered during transmission ensuring confidentiality -> only the intended recipients can access and read the data ensuring availability -> the assurance of timely and reliable access to data 9. Which statement describes a characteristic of cloud computing? A business can connect directly to the Internet without the use of an ISP. Devices can connect to the Internet through existing electrical wiring. Investment in new infrastructure is required in order to access the cloud. Applications can be accessed over the Internet through a subscription. 10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) cellular dialup satellite DSL dedicated leased line 11. What is a characteristic of circuit-switched networks? A single message can be broken into multiple message blocks that are transmitted through multiple circuits simultaneously. If all circuits are busy, a new call cannot be placed. If a circuit fails, the call will be forwarded on a new path. Circuit-switched networks can dynamically learn and use redundant circuits. 12. Requiring strong, complex passwords is a practice that supports which network security goal?
  • 3. maintaining communication integrity ensuring redundancy ensuring data confidentiality ensuring reliability of access 13. What two criteria are used to help select network media? (Choose two.) the distance the media can successfully carry a signal the environment where the media is to be installed the cost of the end devices utilized in the network the number of intermediary devices installed in the network the types of data that need to be prioritized 14. Which statement describes a network that supports QoS? Data sent over the network is not altered in transmission. The fewest possible devices are affected by a failure. The network provides predictable levels of service to different types of traffic. The network should be able to expand to keep up with user demand. 15. Refer to the exhibit. Which set of devices contains only intermediary devices? A, B, E, F A, B, D, G G, H, I, J C, D, G, I 16. Which device performs the function of determining the path that messages should take through internetworks? a web server a DSL modem a router a firewall 17. Which tool provides real-time video and audio communication over the Internet so that businesses can conduct corporate meetings with participants from several remote locations? wiki instant messaging weblog TelePresence
  • 4. 18. Which two statements about the relationship between LANs and WANs are true? (Choose two.) Both LANs and WANs connect end devices. WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices. The Internet is a WAN. WANs must be publicly-owned, but LANs can be owned by either public or private entities. 19. Which three network tools provide the minimum required security protection for home users? (Choose three.) antivirus software antispyware software an intrusion prevention system powerline networking a firewall access control lists 20. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? intranet wired LAN wireless LAN extranet wireless WAN 21. Which expression accurately defines the term congestion? a method of limiting the impact of a hardware or software failure on the network a set of techniques to manage the utilization of network resources a state where the demand on the network resources exceeds the available capacity a measure of the data carrying capacity of the network