CCNA 1 – Introduction to Networks Quiz
56 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which two traffic types utilize the Real-Time Transport Protocol (RTP)?

  • Audio conferencing traffic (correct)
  • Web browsing traffic
  • Email traffic
  • Video streaming traffic (correct)
  • What wireless technology is particularly suited for low-power and low-data rate applications in home automation?

  • Bluetooth
  • LTE
  • Wi-Fi
  • Zigbee (correct)
  • Which layer of the TCP/IP model is responsible for routing messages through an internetwork?

  • Application layer
  • Data link layer
  • Internet layer (correct)
  • Transport layer
  • Which type of server uses record types such as A, NS, AAAA, and MX to provide its services?

    <p>DNS server</p> Signup and view all the answers

    What is a characteristic of proprietary protocols?

    <p>Controlled by a specific vendor</p> Signup and view all the answers

    What service does DNS provide?

    <p>Name resolution services</p> Signup and view all the answers

    A packet received by a server has a destination port number of 110. What service is the client requesting?

    <p>Email receiving</p> Signup and view all the answers

    What networking model is employed when a shared printer is accessible to other computers on the same home network?

    <p>Peer-to-peer model</p> Signup and view all the answers

    What is an advantage for small organizations of adopting IMAP instead of POP?

    <p>IMAP allows multiple devices to access the same mailbox simultaneously.</p> Signup and view all the answers

    Which software utility can a technician use to diagnose connectivity issues when they can ping the IP address but not the URL address of a web server?

    <p>nslookup</p> Signup and view all the answers

    Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication?

    <p>Logical addressing</p> Signup and view all the answers

    What is the effect of applying the global configuration command ip default-gateway 172.16.100.1 to a switch?

    <p>It allows the switch to communicate beyond its local network.</p> Signup and view all the answers

    What happens when the transport input ssh command is entered on the switch vty lines?

    <p>The switch will accept only secure SSH connections.</p> Signup and view all the answers

    What type of attack is initiated by a disgruntled employee using wireless networking tools to hack a corporate wireless network?

    <p>Reconnaissance attack</p> Signup and view all the answers

    Which range of link-local addresses can be assigned to an IPv6-enabled interface?

    <p>FE80::/10</p> Signup and view all the answers

    What is the purpose of the TCP sliding window?

    <p>To manage flow control between sender and receiver.</p> Signup and view all the answers

    Which characteristic describes antispyware?

    <p>It is software designed to remove spyware from a system.</p> Signup and view all the answers

    Which two security solutions are most likely to be used only in a corporate environment?

    <p>Intrusion Detection Systems</p> Signup and view all the answers

    What service is provided by FTP?

    <p>Transferring files between a client and a server.</p> Signup and view all the answers

    Which two statements accurately describe an advantage or disadvantage of deploying NAT for IPv4 in a network?

    <p>NAT enhances security by obscuring internal IP addresses.</p> Signup and view all the answers

    Which mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?

    <p>Time-to-Live (TTL)</p> Signup and view all the answers

    What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?

    <p>2001:DA48:FC5:A4:3D1B:0:0:0:0</p> Signup and view all the answers

    Which single subnet mask would best accommodate 22 IP phones, 20 PCs, 2 printers, and 2 scanners?

    <p>/26</p> Signup and view all the answers

    What is the minimum network mask required for a new LAN supporting 200 connected devices?

    <p>/23</p> Signup and view all the answers

    Which service is being requested if a packet has a destination port number of 21?

    <p>FTP</p> Signup and view all the answers

    Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?

    <p>IPv6 reduces the time for routing and forwarding.</p> Signup and view all the answers

    What characteristic describes identity theft?

    <p>Unauthorized use of someone else's personal information.</p> Signup and view all the answers

    What must a client do after generating an IPv6 address using SLAAC?

    <p>Send a Neighbor Solicitation message.</p> Signup and view all the answers

    Which wireless technology is popular in IoT environments due to its low-power requirements?

    <p>LoRaWAN</p> Signup and view all the answers

    Which ICMPv6 message types must be permitted to allow resolution of Layer 3 addresses to Layer 2 MAC addresses?

    <p>Neighbor Solicitation and Neighbor Advertisement</p> Signup and view all the answers

    What attribute of a NIC allows it to operate at the data link layer of the OSI model?

    <p>Physical address identification.</p> Signup and view all the answers

    What technique is used with UTP cable to protect against interference from crosstalk?

    <p>Twisted pairs of wire.</p> Signup and view all the answers

    What is one possible cause for unsuccessful pings to the default gateway but successful pings outside the local network?

    <p>The default gateway is powered off.</p> Signup and view all the answers

    How many total host addresses are unused across four subnets with a network address of 192.168.99.0 and a /26 mask?

    <p>20</p> Signup and view all the answers

    What will the destination address be in the frame when an IP packet leaves host A directed to host B?

    <p>The MAC address of host B</p> Signup and view all the answers

    What is a benefit of using cloud computing in networking?

    <p>Enhanced scalability and flexibility</p> Signup and view all the answers

    Which two statements correctly describe a characteristic of the CSMA/CD process? (Choose two.)

    <p>Ensures all devices wait their turn to send data</p> Signup and view all the answers

    What are two functions provided by the network layer? (Choose two.)

    <p>Routing data packets between networks</p> Signup and view all the answers

    Which two statements correctly describe features of an IPv4 routing table on a router? (Choose two.)

    <p>Displays next hop information for packet delivery</p> Signup and view all the answers

    What value in an IPv4 header is decremented by each router that receives a packet?

    <p>Time to Live (TTL)</p> Signup and view all the answers

    What type of malware might be introduced that causes slow performance of the network?

    <p>Adware</p> Signup and view all the answers

    During encapsulation of an HTTP request, what information is added to the address field of a frame?

    <p>The MAC address of the default gateway</p> Signup and view all the answers

    Which tool should a technician use with administrator privileges to locate network issues for a slow-loading web page?

    <p>Tracert command</p> Signup and view all the answers

    Which command could be used on a Windows host to display the routing table?

    <p>route print</p> Signup and view all the answers

    Which two factors may interfere with copper cabling and result in signal distortion and data corruption?

    <p>Electromagnetic interference from devices</p> Signup and view all the answers

    How does a device obtain a destination MAC address when there are no mappings in its ARP cache?

    <p>It sends a broadcast ARP request</p> Signup and view all the answers

    What is the smallest network mask that can support 25 connected devices?

    <p>/26</p> Signup and view all the answers

    Which component is addressed in the AAA network service framework for assigning Read-Only rights to a Public folder?

    <p>Authorization</p> Signup and view all the answers

    What layer 2 destination address is contained in the PDU transmitted from Host B to the router?

    <p>00-00-0c-94-36-ab</p> Signup and view all the answers

    What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?

    <p>The router will support IPv6 unicast traffic</p> Signup and view all the answers

    Which three layers of the OSI model map to the application layer of the TCP/IP model?

    <p>Layer 5, Layer 6, Layer 7</p> Signup and view all the answers

    Which two ICMPv6 messages are not present in ICMP for IPv4?

    <p>Neighbor Solicitation</p> Signup and view all the answers

    What does the term 'attenuation' mean in data communication?

    <p>Loss of signal strength over distance</p> Signup and view all the answers

    What are two characteristics of IP?

    <p>Supports multiple protocols</p> Signup and view all the answers

    Which scenario describes a function provided by the transport layer?

    <p>Data segmentation and reassembly</p> Signup and view all the answers

    What will happen if the default gateway address is incorrectly configured on a host?

    <p>The host can only communicate with its local subnet</p> Signup and view all the answers

    Study Notes

    Exam Structure and Requirements

    • Exam consists of 60 questions.
    • Passing score is 70%.
    • Time limit per attempt is 1 hour and 15 minutes.
    • Course: CCNA 1 – Introduction to Networks (Version 7.00) – ITNv7.

    Key Protocols and Services

    • Real-Time Transport Protocol (RTP): Used for two traffic types (specific types not specified).
    • DNS (Domain Name System): Resolves domain names to IP addresses.
    • SMTP (Simple Mail Transfer Protocol): Used for sending email.
    • POP3 (Post Office Protocol version 3): Used for receiving email.
    • HTTP (Hypertext Transfer Protocol): Used for web browsing.
    • HTTPS (Hypertext Transfer Protocol Secure): Secure web browsing.
    • FTP (File Transfer Protocol): Used for transferring files.
    • IMAP (Internet Message Access Protocol): Used for email management, alternative to POP3.
    • BOOTP (Bootstrap Protocol): Dynamically assigns IP addresses.
    • DHCP (Dynamic Host Configuration Protocol): Dynamically assigns IP addresses, subnet masks, and other configuration parameters.
    • SSH (Secure Shell): Secure remote connection protocol.
    • ARP (Address Resolution Protocol): Maps IP addresses to MAC addresses.
    • ICMP (Internet Control Message Protocol): Used for error messages and diagnostics.
    • ICMPv6: Version of ICMP for IPv6.
    • QoS (Quality of Service): Used to prioritize network traffic.
    • NAT (Network Address Translation): Used to translate private IP addresses to public IP addresses.
    • HTTPS: Secure web communication.

    Network Devices and Configurations

    • IP Configuration (Windows): Using command-line tools to view IP address settings on a Windows PC.

    Network Security

    • Virus: Malicious software that can replicate itself.
    • Trojan Horse: Malicious software that disguises itself as a benign program.
    • DoS (Denial-of-Service) attack: Attack aimed at disrupting network service.
    • Antivirus software: Protects against viruses.
    • Antispyware: Protects against spyware.
    • VPN: Virtual Private Network, used for secure remote access..
    • Firewall: Security system that controls network traffic.
    • IPS(Intrusion prevention system): Security system that monitors network for malicious activities.

    OSI and TCP/IP Models

    • TCP/IP Model Layers: Specific layers are identified and used in data transfer processes.
    • OSI Model Layers: Relevant OSI layers are discussed, but their mapping to TCP/IP might not all be explicit layers.
    • PDU (Protocol Data Unit): Data as it travels between protocols and layers.
    • MAC addresses: Unique hardware addresses for network devices
    • IP addresses: Unique logical addresses for network devices
    • Subnet Masks: Needed to determine network and host part of the IP address.

    Network Cabling and Wireless

    • UTP (Unshielded Twisted Pair) cabling interference: Interference sources identified like proximity to electrical equipment, proximity to fluorescent lights.

    Troubleshooting and Diagnostics

    • ARP cache: Needed for resolving IP addresses to MAC addresses.
    • Protocol analyzer: Device for observing and analyzing network traffic.
    • Tracert: Tool to trace route from source to destination.

    Other key concepts not listed

    • Addressing
    • Routers function
    • Wireless technologies with specific low-power and low-data requirements
    • Ethernet communication
    • Switch configuration errors

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on key protocols and services covered in the CCNA 1 – Introduction to Networks course. This quiz features 60 questions focusing on protocols like DNS, SMTP, and HTTP, among others. Achieve a passing score of 70% within a 1 hour and 15 minutes time limit.

    More Like This

    Use Quizgecko on...
    Browser
    Browser