ICND Part 1

42 Questions | Attempts: 147
Share

SettingsSettingsSettings
ICND Quizzes & Trivia

Test review of First Module from ICND Pt1 Vol 1 Ver 1


Questions and Answers
  • 1. 

    Which three statements about networks are accurate? Choose three.)

    • A.

      Networks are used to transmit data in many kinds of environments, including homes, small businesses, and large enterprises.

    • B.

      A main office can have hundreds or even thousands of people who depend on network access to do their jobs.

    • C.

      A network is a connected collection of devices that can communicate with each other.

    • D.

      A main office usually has one large network to connect all users.

    • E.

      The purpose of a network is to create a means to provide all workers with access to all information and components that are accessible by the network. Remote locations cannot connect to a main office through a network.

    Correct Answer(s)
    A. Networks are used to transmit data in many kinds of environments, including homes, small businesses, and large enterprises.
    B. A main office can have hundreds or even thousands of people who depend on network access to do their jobs.
    C. A network is a connected collection of devices that can communicate with each other.
  • 2. 

    What is the purpose of a router?

    • A.

      To interconnect networks and choose the best paths between them

    • B.

      to provide the connection points for the media

    • C.

      to serve as the end point in the network, sending and receiving data

    • D.

      to provide the means by which the signals are transmitted from one networked device to another

    Correct Answer
    A. To interconnect networks and choose the best paths between them
  • 3. 

    What is the purpose of a switch?

    • A.

      To connect separate networks and filter the traffic over those networks so that the data is transmitted through the most efficient route

    • B.

      To choose the path over which data is sent to its destination

    • C.

      To serve as the end point in the network, sending and receiving data

    • D.

      To provide network attachment to the end systems and intelligent switching of the data within the local network

    Correct Answer
    D. To provide network attachment to the end systems and intelligent switching of the data within the local network
  • 4. 

    What is the purpose of network interconnections?

    • A.

      To connect separate networks and filter the traffic over those networks so that the data is transmitted through the most efficient route

    • B.

      To choose the path over which data is sent to its destination

    • C.

      To provide a means for data to travel from one point to another in the network

    • D.

      To provide network attachment to the end systems and intelligent switching of the data within the local network

    Correct Answer
    C. To provide a means for data to travel from one point to another in the network
  • 5. 

    Which resource is not sharable on a network?

    • A.

      Memory

    • B.

      Applications

    • C.

      Peripherals

    • D.

      Storage devices

    Correct Answer
    A. Memory
  • 6. 

    Which three of the following are common network applications? (Choose three.)

    • A.

      E-mail

    • B.

      Collaboration

    • C.

      Graphics creation

    • D.

      Databases

    • E.

      Spreadsheets

    Correct Answer(s)
    A. E-mail
    B. Collaboration
    D. Databases
  • 7. 

    Which statement about physical networking topologies is accurate?

    • A.

      A physical topology defines the way in which the computers, printers, network devices, and other devices are connected.

    • B.

      There are two primary categories of physical topologies: bus and star.

    • C.

      A physical topology describes the paths that signals travel from one point on a network to another.

    • D.

      The choice of a physical topology is largely influenced by the type of data to be transmitted over the network.

    Correct Answer
    A. A physical topology defines the way in which the computers, printers, network devices, and other devices are connected.
  • 8. 

    Which statement about logical topologies is accurate?

    • A.

      A logical topology defmes the way in which the computers, printers, network devices, and other devices are connected.

    • B.

      A logical topology depends solely on the type of computers to be included in the network.

    • C.

      A logical topology describes the paths that the signals travel from one point on a network to another.

    • D.

      A network cannot have different logical and physical topologies.

    Correct Answer
    C. A logical topology describes the paths that the signals travel from one point on a network to another.
  • 9. 

    This design adds redundancy to the network.

    • A.

      Star

    • B.

      Bus

    • C.

      Ring

    • D.

      Partial-mesh

    • E.

      Dual ring

    Correct Answer
    E. Dual ring
  • 10. 

    Which two statements about wireless networks are accurate?

    • A.

      Instead of cables, wireless communication uses RF or infrared waves to transmit data.

    • B.

      To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.

    • C.

      For wireless LANs, a key component is a router, which propagates signal distribution.

    • D.

      Wireless networks are not very common, and generally only large corporations use them.

    Correct Answer(s)
    A. Instead of cables, wireless communication uses RF or infrared waves to transmit data.
    B. To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.
  • 11. 

    What is the main threat to a closed network?

    • A.

      Deliberate attack from outside

    • B.

      a deliberate or accidental attack from inside

    • C.

      misuse by customers

    • D.

      misuse by employees

    Correct Answer
    B. a deliberate or accidental attack from inside
  • 12. 

    Which two factors have recently influenced the increase in threats from hackers?

    • A.

      Hacker tools require more technical knowledge to use

    • B.

      Hacker tools have become more sophisticated.

    • C.

      The number of reported security threats has remained constant year to year

    • D.

      Hacker tools require less technical knowledge to use

    Correct Answer(s)
    B. Hacker tools have become more sophisticated.
    D. Hacker tools require less technical knowledge to use
  • 13. 

    Which of the following four attacks is classified as an access attack?

    • A.

      Password attacks

    • B.

      DDoS

    • C.

      Trojan horse

    • D.

      Love Bug

    Correct Answer
    A. Password attacks
  • 14. 

    Which two statements about the purpose of the OSI model are accurate? Choose two

    • A.

      The OSI model defines the network functions that occur at each layer.

    • B.

      The OSI model ensures reliable data delivery through its layered approach

    • C.

      The OSI model allows changes in one layer to affect the other layers

    • D.

      The OSI model facilitates an understanding of how information travels throughout a network.

    Correct Answer(s)
    A. The OSI model defines the network functions that occur at each layer.
    D. The OSI model facilitates an understanding of how information travels throughout a network.
  • 15. 

    What is the function of a network protocol?

    • A.

      uses sets of rules that tell the services of a network what to do

    • B.

      Ensures reliable delivery of data

    • C.

      Routes data to its destination in the most efficient manner

    • D.

      Is a set offunctions that determine how data is defined

    Correct Answer
    A. uses sets of rules that tell the services of a network what to do
  • 16. 

    Which area of the OSI model and the TCP/IP stack is most diverse?

    • A.

      Network layer

    • B.

      Transport layer

    • C.

      Application layer

    • D.

      Data link layer

    Correct Answer
    D. Data link layer
  • 17. 

    How many bits are in an IPv4 address?

    • A.

      16

    • B.

      32

    • C.

      64

    • D.

      128

    Correct Answer
    B. 32
  • 18. 

    The address 172.16.128.17 is of which class?

    • A.

      Class A

    • B.

      Class B

    • C.

      Class C

    • D.

      Class D

    Correct Answer
    B. Class B
  • 19. 

    Which of the following statements is true of a directed-broadcast address?

    • A.

      A broadcast address is an address that has all Os in the host field.

    • B.

      Any IP address in a network can be used as a broadcast address

    • C.

      A directed broadcast address is an address that has all 1 s in the host field.

    • D.

      None of the above is correct.

    Correct Answer
    C. A directed broadcast address is an address that has all 1 s in the host field.
  • 20. 

    Which two of these addresses are private IP addresses?

    • A.

      10.215.34.124

    • B.

      127.16.71.43

    • C.

      172.17.10.10

    • D.

      225.200.15.10

    Correct Answer(s)
    B. 127.16.71.43
    C. 172.17.10.10
  • 21. 

    Which three statements about IP are accurate? (Choose three.)

    • A.

      IP is a connectionless protocol

    • B.

      IP uses relational addressing

    • C.

      IP delivers data reliably

    • D.

      IP does not provide any recovery functions.

    • E.

      IP delivers data on a best-effort basis

    Correct Answer(s)
    A. IP is a connectionless protocol
    D. IP does not provide any recovery functions.
    E. IP delivers data on a best-effort basis
  • 22. 

    Which three statements about TCP are accurate?

    • A.

      TCP operates at Layer 3 of the TCP/IP stack.

    • B.

      TCP is a connection-oriented protocol.

    • C.

      TCP provides no error checking

    • D.

      TCP packets are numbered and sequenced so that the destination can reorder packets and determine if a packet is missing.

    • E.

      Upon receipt of one or more TCP packets, the receiver returns an acknowledgment to the sender indicating that it received the packets.

    Correct Answer(s)
    B. TCP is a connection-oriented protocol.
    D. TCP packets are numbered and sequenced so that the destination can reorder packets and determine if a packet is missing.
    E. Upon receipt of one or more TCP packets, the receiver returns an acknowledgment to the sender indicating that it received the packets.
  • 23. 

    Which characteristic is similar between TCP and UDP?

    • A.

      Operates at Layer 4 (transport layer) of the OSI model and the TCP/IP stack

    • B.

      Capable of performing a very limited form of error checking

    • C.

      Provides service on a best-effort basis and does not guarantee packet delivery

    • D.

      Provides no special features that recover lost or corrupted packets

    Correct Answer
    A. Operates at Layer 4 (transport layer) of the OSI model and the TCP/IP stack
  • 24. 

    When a single computer with one IP address has several websites open at once, this is called -.

    • A.

      Windowing

    • B.

      Session multiplexing

    • C.

      Segmenting

    • D.

      Connection-oriented protocol

    Correct Answer
    B. Session multiplexing
  • 25. 

    TCP is best for which two of the following applications? (Choose two.)

    • A.

      E-mail

    • B.

      Voice streaming

    • C.

      Downloading

    • D.

      Video streaming

    Correct Answer(s)
    A. E-mail
    C. Downloading
  • 26. 

    Which three of the following characteristics apply to UDP? Choose three.

    • A.

      Packets are treated independently

    • B.

      Packet delivery is guaranteed

    • C.

      Packet delivery is not guaranteed

    • D.

      Lost or corrupted packets are not resent

    Correct Answer(s)
    A. Packets are treated independently
    C. Packet delivery is not guaranteed
    D. Lost or corrupted packets are not resent
  • 27. 

    Which two of the following characteristics apply to TCP? (Choose two.)

    • A.

      Packet delivery is not guaranteed

    • B.

      Lost or corrupted packets are not resent

    • C.

      Lost or corrupted packets are resent

    • D.

      TCP segment contains a sequence number and an acknowledgment number

    Correct Answer(s)
    C. Lost or corrupted packets are resent
    D. TCP segment contains a sequence number and an acknowledgment number
  • 28. 

    Proprietary applications use which kind of port?

    • A.

      Dynamically assigned ports

    • B.

      Well-known ports

    • C.

      Registered ports

    Correct Answer
    C. Registered ports
  • 29. 

    The source port in both a UDP header and a TCP header is a -.

    • A.

      16-bit number of the called port

    • B.

      16-bit length of the header

    • C.

      16-bit sum of the header and data fields

    • D.

      16-bit number of the calling port

    Correct Answer
    D. 16-bit number of the calling port
  • 30. 

    Ports that are used only for the duration of a specific session are called -.

    • A.

      Dynamically assigned ports

    • B.

      Well-known ports

    • C.

      Registered ports

    Correct Answer
    A. Dynamically assigned ports
  • 31. 

    Which field in a TCP header ensures that data arrives in correct order?

    • A.

      Acknowledgment number

    • B.

      Sequence number

    • C.

      Reserved

    • D.

      Options

    Correct Answer
    B. Sequence number
  • 32. 

    In a TCP connection setup, the initiating device sends which message?

    • A.

      ACK

    • B.

      Receive SYN

    • C.

      Send SYN

    Correct Answer
    C. Send SYN
  • 33. 

    Acknowledgment and windowing are two forms of -.

    • A.

      Flow control

    • B.

      TCP connection

    • C.

      TCP sequencing

    • D.

      Reliable connections

    Correct Answer
    A. Flow control
  • 34. 

    Windowing provides which of the following services?

    • A.

      The sender can multiplex

    • B.

      The receiver can have outstanding acknowledgments

    • C.

      The receiver can multiplex

    • D.

      The sender can transmit a specified number of unacknowledged segments

    Correct Answer
    D. The sender can transmit a specified number of unacknowledged segments
  • 35. 

    Sequence numbers and acknowledgment numbers are found where?

    • A.

      UDP Header

    • B.

      TCP Header

    • C.

      Initial sequence number

    • D.

      Application Layer

    Correct Answer
    B. TCP Header
  • 36. 

    What organization is responsible for Ethernet standards?

    • A.

      ISO

    • B.

      IEEE

    • C.

      EIA

    • D.

      IEC

    Correct Answer
    B. IEEE
  • 37. 

    What are three characteristics of Ethernet 802.3? (Choose three.)

    • A.

      Based on the CSMA/CD process

    • B.

      Is a standard that has been replaced by Ethernet II

    • C.

      Specifies the physical layer (Layer 1)

    • D.

      Developed in the mid-1970s

    • E.

      Specifies the MAC portion of the data link layer (Layer 2)

    Correct Answer(s)
    A. Based on the CSMA/CD process
    D. Developed in the mid-1970s
    E. Specifies the MAC portion of the data link layer (Layer 2)
  • 38. 

    Which statement about an Ethernet address is accurate?

    • A.

      The address used in an Ethernet LAN directs data to the proper receiving location.

    • B.

      The source address is the 4-byte hexadecimal address of the NIC on the computer that is generating the data packet.

    • C.

      The destination address is the 8-byte hexadecimal address of the NIC on the LAN to which a data packet is being sent

    • D.

      Both the destination and source addresses consist of an 8-byte hexadecimal number.

    Correct Answer
    D. Both the destination and source addresses consist of an 8-byte hexadecimal number.
  • 39. 

    Which statement about MAC addresses is accurate?

    • A.

      A MAC address is a number in hexadecimal format that is physically located on the NIC.

    • B.

      A MAC address is represented by hexadecimal digits that are organized in paIrs

    • C.

      It is not necessary for a device to have a unique MAC address to participate in the network.

    • D.

      The MAC address can never be changed.

    Correct Answer
    A. A MAC address is a number in hexadecimal format that is physically located on the NIC.
  • 40. 

    Which statement about NICs is accurate?

    • A.

      The NIC plugs into a USB port and provides a port for connecting to the network.

    • B.

      The NIC communicates with the network through a serial connection and communicates with the computer through a parallel connection

    • C.

      The NIC communicates with the network through a parallel connection and communicates with the computer through a serial connection.

    • D.

      An NIC is also referred to as a switch adapter

    Correct Answer
    B. The NIC communicates with the network through a serial connection and communicates with the computer through a parallel connection
  • 41. 

    Which minimum category of UTP is required for Ethernet  1OOO BASE- T?

    • A.

      Cat 3

    • B.

      Cat 4

    • C.

      Cat 5

    • D.

      Cat 5e

    Correct Answer
    D. Cat 5e
  • 42. 

    Which three characteristics pertain to UTP?

    • A.

      UTP cable is an eight-pair wire.

    • B.

      An insulating material covers each of the individual copper wires in UTP cable.

    • C.

      The wires in each pair are wrapped around each other.

    • D.

      There is limited signal degradation from EMI and RFI.

    • E.

      There are seven categories of UTP cable.

    Correct Answer(s)
    B. An insulating material covers each of the individual copper wires in UTP cable.
    C. The wires in each pair are wrapped around each other.
    E. There are seven categories of UTP cable.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 09, 2009
    Quiz Created by
    Whithickson
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.