Quizzes
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
IT Certification
›
CCNA
ICND Part 1
42 Questions
|
By Whithickson | Updated: Mar 18, 2022
| Attempts: 147
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 43
🏆
Rank #--
▾
0 %
0/100
Score
0/100
1.
How many bits are in an IPv4 address?
16
32
64
128
Submit
Start Quiz
About This Quiz
Test review of First Module from ICND Pt1 Vol 1 Ver 1
2.
What first name or nickname would you like us to use?
You may optionally provide this to label your report, leaderboard, or certificate.
2.
The address 172.16.128.17 is of which class?
Class A
Class B
Class C
Class D
Submit
3.
What organization is responsible for Ethernet standards?
ISO
IEEE
EIA
IEC
Submit
4.
Ports that are used only for the duration of a specific session are called -.
Dynamically assigned ports
Well-known ports
Registered ports
Submit
5.
Which characteristic is similar between TCP and UDP?
Operates at Layer 4 (transport layer) of the OSI model and the TCP/IP stack
Capable of performing a very limited form of error checking
Provides service on a best-effort basis and does not guarantee packet delivery
Provides no special features that recover lost or corrupted packets
Submit
6.
Which resource is not sharable on a network?
Memory
Applications
Peripherals
Storage devices
Submit
7.
Sequence numbers and acknowledgment numbers are found where?
UDP Header
TCP Header
Initial sequence number
Application Layer
Submit
8.
What is the purpose of a router?
To interconnect networks and choose the best paths between them
To provide the connection points for the media
To serve as the end point in the network, sending and receiving data
To provide the means by which the signals are transmitted from one networked device to another
Submit
9.
TCP is best for which two of the following applications? (Choose two.)
E-mail
Voice streaming
Downloading
Video streaming
Submit
10.
Which field in a TCP header ensures that data arrives in correct order?
Acknowledgment number
Sequence number
Reserved
Options
Submit
11.
In a TCP connection setup, the initiating device sends which message?
ACK
Receive SYN
Send SYN
Submit
12.
When a single computer with one IP address has several websites open at once, this is called -.
Windowing
Session multiplexing
Segmenting
Connection-oriented protocol
Submit
13.
Which three of the following characteristics apply to UDP? Choose three.
Packets are treated independently
Packet delivery is guaranteed
Packet delivery is not guaranteed
Lost or corrupted packets are not resent
Submit
14.
Which statement about physical networking topologies is accurate?
A physical topology defines the way in which the computers, printers, network devices, and other devices are connected.
There are two primary categories of physical topologies: bus and star.
A physical topology describes the paths that signals travel from one point on anetwork to another.
The choice of a physical topology is largely influenced by the type of data to be transmitted over the network.
Submit
15.
Which statement about MAC addresses is accurate?
A MAC address is a number in hexadecimal format that is physically located on the NIC.
A MAC address is represented by hexadecimal digits that are organized in paIrs
It is not necessary for a device to have a unique MAC address to participate in the network.
The MAC address can never be changed.
Submit
16.
Which two of the following characteristics apply to TCP? (Choose two.)
Packet delivery is not guaranteed
Lost or corrupted packets are not resent
Lost or corrupted packets are resent
TCP segment contains a sequence number and an acknowledgment number
Submit
17.
Which of the following statements is true of a directed-broadcast address?
A broadcast address is an address that has all Os in the host field.
Any IP address in a network can be used as a broadcast address
A directed broadcast address is an address that has all 1 s in the host field.
None of the above is correct.
Submit
18.
Which of the following four attacks is classified as an access attack?
Password attacks
DDoS
Trojan horse
Love Bug
Submit
19.
What is the main threat to a closed network?
Deliberate attack from outside
A deliberate or accidental attack from inside
Misuse by customers
Misuse by employees
Submit
20.
Which two factors have recently influenced the increase in threats from hackers?
Hacker tools require more technical knowledge to use
Hacker tools have become more sophisticated.
The number of reported security threats has remained constant year to year
Hacker tools require less technical knowledge to use
Submit
21.
Which three of the following are common network applications? (Choose three.)
E-mail
Collaboration
Graphics creation
Databases
Spreadsheets
Submit
22.
What is the function of a network protocol?
Uses sets of rules that tell the services of a network what to do
Ensures reliable delivery of data
Routes data to its destination in the most efficient manner
Is a set offunctions that determine how data is defined
Submit
23.
Proprietary applications use which kind of port?
Dynamically assigned ports
Well-known ports
Registered ports
Submit
24.
Which statement about logical topologies is accurate?
A logical topology defmes the way in which the computers, printers, networkdevices, and other devices are connected.
A logical topology depends solely on the type of computers to be included in the network.
A logical topology describes the paths that the signals travel from one point on a network to another.
A network cannot have different logical and physical topologies.
Submit
25.
Which three statements about TCP are accurate?
TCP operates at Layer 3 of the TCP/IP stack.
TCP is a connection-oriented protocol.
TCP provides no error checking
TCP packets are numbered and sequenced so that the destination can reorderpackets and determine if a packet is missing.
Upon receipt of one or more TCP packets, the receiver returns an acknowledgment to the sender indicating that it received...
Upon receipt of one or more TCP packets, the receiver returns an acknowledgment to the sender indicating that it received the packets.
Submit
26.
Acknowledgment and windowing are two forms of -.
Flow control
TCP connection
TCP sequencing
Reliable connections
Submit
27.
Which minimum category of UTP is required for Ethernet 1OOO BASE- T?
Cat 3
Cat 4
Cat 5
Cat 5e
Submit
28.
What is the purpose of a switch?
To connect separate networks and filter the traffic over those networks so thatthe data is transmitted through the most efficient...
To connect separate networks and filter the traffic over those networks so thatthe data is transmitted through the most efficient route
To choose the path over which data is sent to its destination
To serve as the end point in the network, sending and receiving data
To provide network attachment to the end systems and intelligent switching of the data within the local network
Submit
29.
Which two statements about wireless networks are accurate?
Instead of cables, wireless communication uses RF or infrared waves to transmit data.
To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.
For wireless LANs, a key component is a router, which propagates signal distribution.
Wireless networks are not very common, and generally only large corporations use them.
Submit
30.
Which statement about NICs is accurate?
The NIC plugs into a USB port and provides a port for connecting to thenetwork.
The NIC communicates with the network through a serial connection and communicates with the computer through a parallel connection
The NIC communicates with the network through a parallel connection and communicates with the computer through a serial connection.
An NIC is also referred to as a switch adapter
Submit
31.
Which three statements about networks are accurate? Choose three.)
Networks are used to transmit data in many kinds of environments, includinghomes, small businesses, and large enterprises.
A main office can have hundreds or even thousands of people who depend on network access to do their jobs.
A network is a connected collection of devices that can communicate with each other.
A main office usually has one large network to connect all users.
The purpose of a network is to create a means to provide all workers with access to all information and...
The purpose of a network is to create a means to provide all workers with access to all information and components that are accessible by the network. Remote locations cannot connect to a main office through a network.
Submit
32.
Which two statements about the purpose of the OSI model are accurate? Choose two
The OSI model defines the network functions that occur at each layer.
The OSI model ensures reliable data delivery through its layered approach
The OSI model allows changes in one layer to affect the other layers
The OSI model facilitates an understanding of how information travels throughout a network.
Submit
33.
Windowing provides which of the following services?
The sender can multiplex
The receiver can have outstanding acknowledgments
The receiver can multiplex
The sender can transmit a specified number of unacknowledged segments
Submit
34.
Which statement about an Ethernet address is accurate?
The address used in an Ethernet LAN directs data to the proper receivinglocation.
The source address is the 4-byte hexadecimal address of the NIC on the computer that is generating the data packet.
The destination address is the 8-byte hexadecimal address of the NIC on the LAN to which a data packet is...
The destination address is the 8-byte hexadecimal address of the NIC on the LAN to which a data packet is being sent
Both the destination and source addresses consist of an 8-byte hexadecimal number.
Submit
35.
The source port in both a UDP header and a TCP header is a -.
16-bit number of the called port
16-bit length of the header
16-bit sum of the header and data fields
16-bit number of the calling port
Submit
36.
This design adds redundancy to the network.
Star
Bus
Ring
Partial-mesh
Dual ring
Submit
37.
Which three statements about IP are accurate? (Choose three.)
IP is a connectionless protocol
IP uses relational addressing
IP delivers data reliably
IP does not provide any recovery functions.
IP delivers data on a best-effort basis
Submit
38.
Which three characteristics pertain to UTP?
UTP cable is an eight-pair wire.
An insulating material covers each of the individual copper wires in UTPcable.
The wires in each pair are wrapped around each other.
There is limited signal degradation from EMI and RFI.
There are seven categories of UTP cable.
Submit
39.
Which area of the OSI model and the TCP/IP stack is most diverse?
Network layer
Transport layer
Application layer
Data link layer
Submit
40.
What are three characteristics of Ethernet 802.3? (Choose three.)
Based on the CSMA/CD process
Is a standard that has been replaced by Ethernet II
Specifies the physical layer (Layer 1)
Developed in the mid-1970s
Specifies the MAC portion of the data link layer (Layer 2)
Submit
41.
What is the purpose of network interconnections?
To connect separate networks and filter the traffic over those networks so thatthe data is transmitted through the most efficient...
To connect separate networks and filter the traffic over those networks so thatthe data is transmitted through the most efficient route
To choose the path over which data is sent to its destination
To provide a means for data to travel from one point to another in the network
To provide network attachment to the end systems and intelligent switching of the data within the local network
Submit
42.
Which two of these addresses are private IP addresses?
10.215.34.124
127.16.71.43
172.17.10.10
225.200.15.10
Submit
×
Thank you for your feedback!
View My Results
Related Quizzes
CCNA Subnetting Quiz Questions and Answers
CCNA Subnetting Quiz Questions and Answers
CCNA - OSPF Quiz Questions and Answers
CCNA - OSPF Quiz Questions and Answers
CCNA Quiz Exam: Hardest MCQ!
CCNA Quiz Exam: Hardest MCQ!
CCNA OSI Layer Exam Quiz
CCNA OSI Layer Exam Quiz
A Unique Quiz On CCNA – IPv6
A Unique Quiz On CCNA – IPv6
Ait CCNA 1 Network Fundamentals Rec Chapter 5
Ait CCNA 1 Network Fundamentals Rec Chapter 5
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (42)
Unanswered (
)
Answered (
)
How many bits are in an IPv4 address?
The address 172.16.128.17 is of which class?
What organization is responsible for Ethernet standards?
Ports that are used only for the duration of a specific session are...
Which characteristic is similar between TCP and UDP?
Which resource is not sharable on a network?
Sequence numbers and acknowledgment numbers are found where?
What is the purpose of a router?
TCP is best for which two of the following applications? (Choose two.)
Which field in a TCP header ensures that data arrives in correct...
In a TCP connection setup, the initiating device sends which message?
When a single computer with one IP address has several websites open...
Which three of the following characteristics apply to UDP? Choose...
Which statement about physical networking topologies is accurate?
Which statement about MAC addresses is accurate?
Which two of the following characteristics apply to TCP? (Choose two.)
Which of the following statements is true of a directed-broadcast...
Which of the following four attacks is classified as an access attack?
What is the main threat to a closed network?
Which two factors have recently influenced the increase in threats...
Which three of the following are common network applications? (Choose...
What is the function of a network protocol?
Proprietary applications use which kind of port?
Which statement about logical topologies is accurate?
Which three statements about TCP are accurate?
Acknowledgment and windowing are two forms of -.
Which minimum category of UTP is required for Ethernet 1OOO...
What is the purpose of a switch?
Which two statements about wireless networks are accurate?
Which statement about NICs is accurate?
Which three statements about networks are accurate? Choose three.)
Which two statements about the purpose of the OSI model are accurate?...
Windowing provides which of the following services?
Which statement about an Ethernet address is accurate?
The source port in both a UDP header and a TCP header is a -.
This design adds redundancy to the network.
Which three statements about IP are accurate? (Choose three.)
Which three characteristics pertain to UTP?
Which area of the OSI model and the TCP/IP stack is most diverse?
What are three characteristics of Ethernet 802.3? (Choose three.)
What is the purpose of network interconnections?
Which two of these addresses are private IP addresses?
X
OK
X
OK
Cancel
X
OK
Cancel
Your Rank: #-- / --
Leaderboard
✕