Voordeelbundel
CCNA|Cisco Certified Network Associate|Tests Bundle Set
CCNA|Cisco Certified Network Associate|Tests Bundle Set
[Meer zien]CCNA|Cisco Certified Network Associate|Tests Bundle Set
[Meer zien]What is the primary purpose of a VLAN? CORRECT ANSWER To create a broadcast domain; enable segmentation or isolation of broadcast traffic 
 
Unassigned Cisco switch ports remain in which VLAN? CORRECT ANSWER VLAN 1 
 
Do VLANs prevent broadcast storms? CORRECT ANSWER No, they minimize the size and e...
Voorbeeld 3 van de 22 pagina's
In winkelwagenWhat is the primary purpose of a VLAN? CORRECT ANSWER To create a broadcast domain; enable segmentation or isolation of broadcast traffic 
 
Unassigned Cisco switch ports remain in which VLAN? CORRECT ANSWER VLAN 1 
 
Do VLANs prevent broadcast storms? CORRECT ANSWER No, they minimize the size and e...
What is the IEEE of Bluetooth? CORRECT ANWER 802.15 WPAN 
 
What is WiMAX and it IEEE? CORRECT ANWER -Worldwide Interoperability for Microwave Access 
-IEEE 802.16 WWAN 
 
In cellular broadband there are two types of cellular networks, what are they? CORRECT ANWER Global System for Mobile (GSM) and ...
Voorbeeld 4 van de 62 pagina's
In winkelwagenWhat is the IEEE of Bluetooth? CORRECT ANWER 802.15 WPAN 
 
What is WiMAX and it IEEE? CORRECT ANWER -Worldwide Interoperability for Microwave Access 
-IEEE 802.16 WWAN 
 
In cellular broadband there are two types of cellular networks, what are they? CORRECT ANWER Global System for Mobile (GSM) and ...
True statements about the operation of a full-duplex Ethernet network CORRECT ANSWER There are no collisions in full-duplex mode. 
A dedicated switch port is required for each full-duplex node. 
The host network card and the switch port must be capable of operating in full-duplex mode. 
 
Which OSI ...
Voorbeeld 1 van de 4 pagina's
In winkelwagenTrue statements about the operation of a full-duplex Ethernet network CORRECT ANSWER There are no collisions in full-duplex mode. 
A dedicated switch port is required for each full-duplex node. 
The host network card and the switch port must be capable of operating in full-duplex mode. 
 
Which OSI ...
Network Characteristics CORRECT ANSWER Topoplogy 
Speed 
Cost 
Security 
Availability 
Scalability 
Reliability 
 
OSI (Open System Interconnect) Model CORRECT ANSWER A conceptual model to data transmission at each individual layer. How networks talk to each other 
 
OSI layers CORRECT ANSWER Sende...
Voorbeeld 2 van de 15 pagina's
In winkelwagenNetwork Characteristics CORRECT ANSWER Topoplogy 
Speed 
Cost 
Security 
Availability 
Scalability 
Reliability 
 
OSI (Open System Interconnect) Model CORRECT ANSWER A conceptual model to data transmission at each individual layer. How networks talk to each other 
 
OSI layers CORRECT ANSWER Sende...
Which communication tool allows real-time collaboration? 
 
a. wiki 
b. e-mail 
c. weblog 
d. instant messaging CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (...
Voorbeeld 4 van de 64 pagina's
In winkelwagenWhich communication tool allows real-time collaboration? 
 
a. wiki 
b. e-mail 
c. weblog 
d. instant messaging CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (...
Which of the following are the address ranges of the private IP addresses? (Choose three.) CORRECT ANSWER 10.0.0.0 to 10.255.255.255 ; 
172.16.0.0 to 172.31.255.255; 
192.168.0.0 to 192.168.255.255 
 
Which two functions of the OSI model occur at layer two? (Choose two.) CORRECT ANSWER physical addr...
Voorbeeld 2 van de 12 pagina's
In winkelwagenWhich of the following are the address ranges of the private IP addresses? (Choose three.) CORRECT ANSWER 10.0.0.0 to 10.255.255.255 ; 
172.16.0.0 to 172.31.255.255; 
192.168.0.0 to 192.168.255.255 
 
Which two functions of the OSI model occur at layer two? (Choose two.) CORRECT ANSWER physical addr...
Hosts CORRECT ANSWER All computers that are connected to a network and participate directly in network communication are classified as 
 
End Devices & Clients CORRECT ANSWER Hosts can be called 
 
Hosts CORRECT ANSWER devices on the network that are assigned a number for communication purposes 
 
I...
Voorbeeld 2 van de 10 pagina's
In winkelwagenHosts CORRECT ANSWER All computers that are connected to a network and participate directly in network communication are classified as 
 
End Devices & Clients CORRECT ANSWER Hosts can be called 
 
Hosts CORRECT ANSWER devices on the network that are assigned a number for communication purposes 
 
I...
What is a network? CORRECT ANSWER A network is all of the components involved in connecting computers and applications across small and large distances to increase productivity and give easy access to information. 
 
What resources are commonly shared across a network? CORRECT ANSWER Data and applic...
Voorbeeld 2 van de 14 pagina's
In winkelwagenWhat is a network? CORRECT ANSWER A network is all of the components involved in connecting computers and applications across small and large distances to increase productivity and give easy access to information. 
 
What resources are commonly shared across a network? CORRECT ANSWER Data and applic...
What are the steps to configure a static route CORRECT ANSWER Configure unidirectional static routes to and from a stub network 
Define a path to the IP destination network 
 
Question: Which of the following commands will display information about the specific port channel interface? CORRECT ANSWER...
Voorbeeld 1 van de 3 pagina's
In winkelwagenWhat are the steps to configure a static route CORRECT ANSWER Configure unidirectional static routes to and from a stub network 
Define a path to the IP destination network 
 
Question: Which of the following commands will display information about the specific port channel interface? CORRECT ANSWER...
The network administrator enters these commands into the R1 router: 
R1# copy running-config tftp 
Address or name of remote host [ ]? 
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt? CORRECT ANSWER 192.168.11.252 
 
Which thr...
Voorbeeld 2 van de 12 pagina's
In winkelwagenThe network administrator enters these commands into the R1 router: 
R1# copy running-config tftp 
Address or name of remote host [ ]? 
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt? CORRECT ANSWER 192.168.11.252 
 
Which thr...
CCNA Practice Exam questions with correct answers
Voorbeeld 2 van de 10 pagina's
In winkelwagenCCNA Practice Exam questions with correct answers
CCNA 1:Module 1 questions with correct answers
Voorbeeld 2 van de 10 pagina's
In winkelwagenCCNA 1:Module 1 questions with correct answers
What is one advantage of using the cut-through switching method instead of the store-and-forward switching method? - Correct Answer-Has a lower latency appropriate for high-performance computing applications. 
 
A _______ network is one that uses the same infrastructure to carry voice, data, and vid...
Voorbeeld 1 van de 4 pagina's
In winkelwagenWhat is one advantage of using the cut-through switching method instead of the store-and-forward switching method? - Correct Answer-Has a lower latency appropriate for high-performance computing applications. 
 
A _______ network is one that uses the same infrastructure to carry voice, data, and vid...
What is a characteristic of a fault tolerant network? CORRECT ANSWER a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure* 
 
Three bank employees are using the corporate network. The first employee uses a web browser to view a company web ...
Voorbeeld 3 van de 18 pagina's
In winkelwagenWhat is a characteristic of a fault tolerant network? CORRECT ANSWER a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure* 
 
Three bank employees are using the corporate network. The first employee uses a web browser to view a company web ...
Voorbeeld 3 van de 25 pagina's
In winkelwagenCCNA 200-301 questions with correct answers
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? 
DoS attack 
identity theft 
spyware 
zero-day attack CORRECT A...
Voorbeeld 3 van de 19 pagina's
In winkelwagenDuring a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? 
DoS attack 
identity theft 
spyware 
zero-day attack CORRECT A...
AAA CORRECT ANSWER Authentication, authorization and accounting 
 
AAA Server CORRECT ANSWER Server providing authentication, authorization and accounting services 
 
Access Control Entry (ACE) CORRECT ANSWER One line in an access control list (ACL) 
 
access interface CORRECT ANSWER A LAN network d...
Voorbeeld 4 van de 54 pagina's
In winkelwagenAAA CORRECT ANSWER Authentication, authorization and accounting 
 
AAA Server CORRECT ANSWER Server providing authentication, authorization and accounting services 
 
Access Control Entry (ACE) CORRECT ANSWER One line in an access control list (ACL) 
 
access interface CORRECT ANSWER A LAN network d...
Which communication tool allows real-time collaboration? CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) CORRECT ANSWER regenerating data signals 
 ...
Voorbeeld 2 van de 10 pagina's
In winkelwagenWhich communication tool allows real-time collaboration? CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) CORRECT ANSWER regenerating data signals 
 ...
Which of the following addresses will a switch use to populate the CAM table? 
 
Destination MAC address 
Source IP address 
Destination IP Address 
Source MAC address CORRECT ANSWER Source MAC address 
 
What is another name for hypervisor? CORRECT ANSWER VMM (Virtual Machine Monitor) 
 
Which tabl...
Voorbeeld 4 van de 56 pagina's
In winkelwagenWhich of the following addresses will a switch use to populate the CAM table? 
 
Destination MAC address 
Source IP address 
Destination IP Address 
Source MAC address CORRECT ANSWER Source MAC address 
 
What is another name for hypervisor? CORRECT ANSWER VMM (Virtual Machine Monitor) 
 
Which tabl...
Ensuring that several individuals are able to perform a specific function in order to have oversight and eliminate single points of failure, is which of the following Operations Security principles? CORRECT ANSWER C. Rotation of duties 
 
A standard ACL: CORRECT ANSWER C. Identifies the source netwo...
Voorbeeld 1 van de 4 pagina's
In winkelwagenEnsuring that several individuals are able to perform a specific function in order to have oversight and eliminate single points of failure, is which of the following Operations Security principles? CORRECT ANSWER C. Rotation of duties 
 
A standard ACL: CORRECT ANSWER C. Identifies the source netwo...
What types of network devices and connections are typically found in a small network? CORRECT ANSWER In a small network, there are typically a couple of end devices like laptops and printers along with a router or switch and a server. 
 
Why is it important to study small networks? CORRECT ANSWER It...
Voorbeeld 2 van de 11 pagina's
In winkelwagenWhat types of network devices and connections are typically found in a small network? CORRECT ANSWER In a small network, there are typically a couple of end devices like laptops and printers along with a router or switch and a server. 
 
Why is it important to study small networks? CORRECT ANSWER It...
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper cracker. Stuvia faciliteert de betaling aan de verkoper.
Nee, je koopt alleen deze samenvatting voor $40.99. Je zit daarna nergens aan vast.
4,6 sterren op Google & Trustpilot (+1000 reviews)
Afgelopen 30 dagen zijn er 87637 samenvattingen verkocht
Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen