CISCO CCNA ICND 1

162 Questions | Total Attempts: 152

SettingsSettingsSettings
ICND Quizzes & Trivia

Questions and Answers
  • 1. 
    Which three statements about networks are accurate?
    • A. 

      Networks are used to transmit data in various environments, including homes, small businesses, and large enterprises.

    • B. 

      A main office can have hundreds or even thousands of people who depend on network access to do their jobs.

    • C. 

      A network is a connected collection of devices that can communicate with each other.

    • D. 

      A main office usually has one large network to connect users

    • E. 

      The purpose of a network is to create means to provide workers with access to all information and components that are accessible by the network.

    • F. 

      Remote locations cannot connect to a main office through a network

  • 2. 
    What is the purpose of a router?
    • A. 

      To interconnect networks and choose the best paths between them.

    • B. 

      To provide the connect points for media

    • C. 

      To serve as the endpoint in the network, sending and receiving data

    • D. 

      To provide the means by which the signals are transmitted from one network device to another

  • 3. 
    What is the purpose of a switch?
    • A. 

      To connect separate networks and filter the traffic over those networks so that the data is transmitted through the most efficient route

    • B. 

      To choose the path over which data is sent to its destination

    • C. 

      To serve as the endpoint in the the network, sending and receiving data

    • D. 

      To provide network attachment to the end systems and intelligent switching of the data within the local network

  • 4. 
    What is the purpose of interconnections?
    • A. 

      To connect separate networks and filter the traffic over those networks so that the data is transmitted through the most efficient route

    • B. 

      To choose the path over which data is sent to its destination

    • C. 

      To provide the means for data to travel from one point to another in the network

    • D. 

      To provide network attachment to the end systems and intelligent switching of the data within the local network

  • 5. 
    Which resource cannot be shared on a network?
    • A. 

      Memory

    • B. 

      Applications

    • C. 

      Peripherals

    • D. 

      Storage devices

    • E. 

      Data

  • 6. 
    Which three of the following are common network applications?
    • A. 

      Email

    • B. 

      Collaboration

    • C. 

      Graphics creation

    • D. 

      Databases

    • E. 

      Word processing

    • F. 

      Spreadsheets

  • 7. 
    BLANK indicates how fast data is transmitted over the network
  • 8. 
    BLANK indicates the general price of components, installation, and maintenance of the network
  • 9. 
    BLANK indicates the protection level of the network itself and the data that is transmitted
  • 10. 
    BLANK indicates how easily users can access the network
  • 11. 
    BLANK indicates how well the network can accomodate more users or data transmission requirements
  • 12. 
    BLANK indicates the dependability of the network
  • 13. 
    BLANK indicates the structure of the network
  • 14. 
    Which statement about physical networking topologies is accurate?
    • A. 

      A physical topology defines the way in which CPU's, printers, networks, devices, and other devices are connected

    • B. 

      There are two primary categories of physical topologies; bus and star

    • C. 

      A physical topology describes the paths that signals travel from one point to another

    • D. 

      The choice of a physical topology is largely influences by the type of data that is to be transmitted over the network

  • 15. 
    Which statement about logical topologies is accurate?
    • A. 

      A logical topology defines the way in which the CPU's, printers, network devices and other devices are connected

    • B. 

      A logical topology depends solely on the type of computers that are to be included on the network

    • C. 

      A logical topology describes the paths that the signals travel from one point on a network to another

    • D. 

      A network connot have different logical and physical topologies

  • 16. 
    All of the network devices connect directly to each other in a linear fashion.
  • 17. 
    Al of the network devices are directly connected to one central point, with no other connections between them
  • 18. 
    All of the devices on a network are connected in the form of a circle
  • 19. 
    Each device has a connection to all other devices
  • 20. 
    At least one device maintains multiple connections to other devices
  • 21. 
    The design adds redundancy to the network
  • 22. 
    Which two statements about wireless networks is accurate?
    • A. 

      Instead of cables, wireless communications uses RF or infrared waves to transmit data

    • B. 

      To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.

    • C. 

      For wireless LAN's, a key component is a router, which propagates signal distribution.

    • D. 

      Wireless networks are not very common and, generally, only large corporations use them

  • 23. 
    What is the main threat to a closed network?
    • A. 

      A deliberate attack from outside

    • B. 

      A deliberate or accidental attack from inside

    • C. 

      Misuse by customers

    • D. 

      Misuse by employees

  • 24. 
    Which of the following four attacks is classified as an access attack?
    • A. 

      Password attacks

    • B. 

      DDoS

    • C. 

      Trojan Horse

    • D. 

      Love Bug

  • 25. 
    Which two factors have recently influenced the increase in threats from Hackers?
    • A. 

      Hacker tools require more technical knowledge to use

    • B. 

      Hacker tools have become more sophisticated

    • C. 

      The number of reported security threats has remained constant year to year

    • D. 

      Hacker toos require less technical knowledge to use