Package deal
CCNA|Cisco Certified Network Associate|Tests Bundle Set
CCNA|Cisco Certified Network Associate|Tests Bundle Set
[Show more]CCNA|Cisco Certified Network Associate|Tests Bundle Set
[Show more]What is the primary purpose of a VLAN? CORRECT ANSWER To create a broadcast domain; enable segmentation or isolation of broadcast traffic 
 
Unassigned Cisco switch ports remain in which VLAN? CORRECT ANSWER VLAN 1 
 
Do VLANs prevent broadcast storms? CORRECT ANSWER No, they minimize the size and e...
Preview 3 out of 22 pages
Add to cartWhat is the primary purpose of a VLAN? CORRECT ANSWER To create a broadcast domain; enable segmentation or isolation of broadcast traffic 
 
Unassigned Cisco switch ports remain in which VLAN? CORRECT ANSWER VLAN 1 
 
Do VLANs prevent broadcast storms? CORRECT ANSWER No, they minimize the size and e...
What is the IEEE of Bluetooth? CORRECT ANWER 802.15 WPAN 
 
What is WiMAX and it IEEE? CORRECT ANWER -Worldwide Interoperability for Microwave Access 
-IEEE 802.16 WWAN 
 
In cellular broadband there are two types of cellular networks, what are they? CORRECT ANWER Global System for Mobile (GSM) and ...
Preview 4 out of 62 pages
Add to cartWhat is the IEEE of Bluetooth? CORRECT ANWER 802.15 WPAN 
 
What is WiMAX and it IEEE? CORRECT ANWER -Worldwide Interoperability for Microwave Access 
-IEEE 802.16 WWAN 
 
In cellular broadband there are two types of cellular networks, what are they? CORRECT ANWER Global System for Mobile (GSM) and ...
True statements about the operation of a full-duplex Ethernet network CORRECT ANSWER There are no collisions in full-duplex mode. 
A dedicated switch port is required for each full-duplex node. 
The host network card and the switch port must be capable of operating in full-duplex mode. 
 
Which OSI ...
Preview 1 out of 4 pages
Add to cartTrue statements about the operation of a full-duplex Ethernet network CORRECT ANSWER There are no collisions in full-duplex mode. 
A dedicated switch port is required for each full-duplex node. 
The host network card and the switch port must be capable of operating in full-duplex mode. 
 
Which OSI ...
Network Characteristics CORRECT ANSWER Topoplogy 
Speed 
Cost 
Security 
Availability 
Scalability 
Reliability 
 
OSI (Open System Interconnect) Model CORRECT ANSWER A conceptual model to data transmission at each individual layer. How networks talk to each other 
 
OSI layers CORRECT ANSWER Sende...
Preview 2 out of 15 pages
Add to cartNetwork Characteristics CORRECT ANSWER Topoplogy 
Speed 
Cost 
Security 
Availability 
Scalability 
Reliability 
 
OSI (Open System Interconnect) Model CORRECT ANSWER A conceptual model to data transmission at each individual layer. How networks talk to each other 
 
OSI layers CORRECT ANSWER Sende...
Which communication tool allows real-time collaboration? 
 
a. wiki 
b. e-mail 
c. weblog 
d. instant messaging CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (...
Preview 4 out of 64 pages
Add to cartWhich communication tool allows real-time collaboration? 
 
a. wiki 
b. e-mail 
c. weblog 
d. instant messaging CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (...
Which of the following are the address ranges of the private IP addresses? (Choose three.) CORRECT ANSWER 10.0.0.0 to 10.255.255.255 ; 
172.16.0.0 to 172.31.255.255; 
192.168.0.0 to 192.168.255.255 
 
Which two functions of the OSI model occur at layer two? (Choose two.) CORRECT ANSWER physical addr...
Preview 2 out of 12 pages
Add to cartWhich of the following are the address ranges of the private IP addresses? (Choose three.) CORRECT ANSWER 10.0.0.0 to 10.255.255.255 ; 
172.16.0.0 to 172.31.255.255; 
192.168.0.0 to 192.168.255.255 
 
Which two functions of the OSI model occur at layer two? (Choose two.) CORRECT ANSWER physical addr...
Hosts CORRECT ANSWER All computers that are connected to a network and participate directly in network communication are classified as 
 
End Devices & Clients CORRECT ANSWER Hosts can be called 
 
Hosts CORRECT ANSWER devices on the network that are assigned a number for communication purposes 
 
I...
Preview 2 out of 10 pages
Add to cartHosts CORRECT ANSWER All computers that are connected to a network and participate directly in network communication are classified as 
 
End Devices & Clients CORRECT ANSWER Hosts can be called 
 
Hosts CORRECT ANSWER devices on the network that are assigned a number for communication purposes 
 
I...
What is a network? CORRECT ANSWER A network is all of the components involved in connecting computers and applications across small and large distances to increase productivity and give easy access to information. 
 
What resources are commonly shared across a network? CORRECT ANSWER Data and applic...
Preview 2 out of 14 pages
Add to cartWhat is a network? CORRECT ANSWER A network is all of the components involved in connecting computers and applications across small and large distances to increase productivity and give easy access to information. 
 
What resources are commonly shared across a network? CORRECT ANSWER Data and applic...
What are the steps to configure a static route CORRECT ANSWER Configure unidirectional static routes to and from a stub network 
Define a path to the IP destination network 
 
Question: Which of the following commands will display information about the specific port channel interface? CORRECT ANSWER...
Preview 1 out of 3 pages
Add to cartWhat are the steps to configure a static route CORRECT ANSWER Configure unidirectional static routes to and from a stub network 
Define a path to the IP destination network 
 
Question: Which of the following commands will display information about the specific port channel interface? CORRECT ANSWER...
The network administrator enters these commands into the R1 router: 
R1# copy running-config tftp 
Address or name of remote host [ ]? 
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt? CORRECT ANSWER 192.168.11.252 
 
Which thr...
Preview 2 out of 12 pages
Add to cartThe network administrator enters these commands into the R1 router: 
R1# copy running-config tftp 
Address or name of remote host [ ]? 
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt? CORRECT ANSWER 192.168.11.252 
 
Which thr...
CCNA Practice Exam questions with correct answers
Preview 2 out of 10 pages
Add to cartCCNA Practice Exam questions with correct answers
CCNA 1:Module 1 questions with correct answers
Preview 2 out of 10 pages
Add to cartCCNA 1:Module 1 questions with correct answers
What is one advantage of using the cut-through switching method instead of the store-and-forward switching method? - Correct Answer-Has a lower latency appropriate for high-performance computing applications. 
 
A _______ network is one that uses the same infrastructure to carry voice, data, and vid...
Preview 1 out of 4 pages
Add to cartWhat is one advantage of using the cut-through switching method instead of the store-and-forward switching method? - Correct Answer-Has a lower latency appropriate for high-performance computing applications. 
 
A _______ network is one that uses the same infrastructure to carry voice, data, and vid...
What is a characteristic of a fault tolerant network? CORRECT ANSWER a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure* 
 
Three bank employees are using the corporate network. The first employee uses a web browser to view a company web ...
Preview 3 out of 18 pages
Add to cartWhat is a characteristic of a fault tolerant network? CORRECT ANSWER a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure* 
 
Three bank employees are using the corporate network. The first employee uses a web browser to view a company web ...
Preview 3 out of 25 pages
Add to cartCCNA 200-301 questions with correct answers
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? 
DoS attack 
identity theft 
spyware 
zero-day attack CORRECT A...
Preview 3 out of 19 pages
Add to cartDuring a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? 
DoS attack 
identity theft 
spyware 
zero-day attack CORRECT A...
AAA CORRECT ANSWER Authentication, authorization and accounting 
 
AAA Server CORRECT ANSWER Server providing authentication, authorization and accounting services 
 
Access Control Entry (ACE) CORRECT ANSWER One line in an access control list (ACL) 
 
access interface CORRECT ANSWER A LAN network d...
Preview 4 out of 54 pages
Add to cartAAA CORRECT ANSWER Authentication, authorization and accounting 
 
AAA Server CORRECT ANSWER Server providing authentication, authorization and accounting services 
 
Access Control Entry (ACE) CORRECT ANSWER One line in an access control list (ACL) 
 
access interface CORRECT ANSWER A LAN network d...
Which communication tool allows real-time collaboration? CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) CORRECT ANSWER regenerating data signals 
 ...
Preview 2 out of 10 pages
Add to cartWhich communication tool allows real-time collaboration? CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) CORRECT ANSWER regenerating data signals 
 ...
Which of the following addresses will a switch use to populate the CAM table? 
 
Destination MAC address 
Source IP address 
Destination IP Address 
Source MAC address CORRECT ANSWER Source MAC address 
 
What is another name for hypervisor? CORRECT ANSWER VMM (Virtual Machine Monitor) 
 
Which tabl...
Preview 4 out of 56 pages
Add to cartWhich of the following addresses will a switch use to populate the CAM table? 
 
Destination MAC address 
Source IP address 
Destination IP Address 
Source MAC address CORRECT ANSWER Source MAC address 
 
What is another name for hypervisor? CORRECT ANSWER VMM (Virtual Machine Monitor) 
 
Which tabl...
Ensuring that several individuals are able to perform a specific function in order to have oversight and eliminate single points of failure, is which of the following Operations Security principles? CORRECT ANSWER C. Rotation of duties 
 
A standard ACL: CORRECT ANSWER C. Identifies the source netwo...
Preview 1 out of 4 pages
Add to cartEnsuring that several individuals are able to perform a specific function in order to have oversight and eliminate single points of failure, is which of the following Operations Security principles? CORRECT ANSWER C. Rotation of duties 
 
A standard ACL: CORRECT ANSWER C. Identifies the source netwo...
What types of network devices and connections are typically found in a small network? CORRECT ANSWER In a small network, there are typically a couple of end devices like laptops and printers along with a router or switch and a server. 
 
Why is it important to study small networks? CORRECT ANSWER It...
Preview 2 out of 11 pages
Add to cartWhat types of network devices and connections are typically found in a small network? CORRECT ANSWER In a small network, there are typically a couple of end devices like laptops and printers along with a router or switch and a server. 
 
Why is it important to study small networks? CORRECT ANSWER It...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller cracker. Stuvia facilitates payment to the seller.
No, you only buy this summary for R745,19. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
83614 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy summaries for 14 years now