Module 1
Networking Today
Module 2:
Basic Switch and End Device Configuration
Module 3:
Protocols and Models
Module 4:
Physical Layer
Module 5:
Number Systems
100

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

DoS attack

Identity theft

Spyware

Zero-day attack

Spyware

100

Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.

It is stored in NVRAM.

It should be deleted using the erase running-config command.

It is automatically saved when the router reboots.

It affects the operation of the device immediately when modified.

100

Which three acronyms/initialisms represent standards organizations? (Choose three.)

IANA

TCP/IP

IEEE

IETF

OSI

MAC

IANA

IEEE

IETF

100

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

Presentation layer

Network layer

Physical layer

Data link layer

Physical layer

100

What is the binary representation for the decimal number 173?

10100111

10100101

10101101

10110101

10101101

200

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

Internet

Intranet

Extranet

Extendednet

Extranet

200

Which two statements are true regarding the user EXEC mode? (Choose two.)

All router commands are available.

Global configuration mode can be accessed by entering the enable command.

The device prompt for this mode ends with the '>' symbol.

Interfaces and routing protocols can be configured.

Only some aspects of the router configuration can be viewed.

The device prompt for this mode ends with the '>' symbol.


Only some aspects of the router configuration can be viewed.

200

What type of communication will send a message to all devices on a local area network?

done

What type of communication will send a message to all devices on a local area network?

Broadcast

Multicast

Unicast

Allcast

Broadcastsignal_cellular_4_bar

Multicast

Unicast

Allcast

Broadcast

200

What type of cable is used to connect a workstation serial port to a Cisco router console port?

Crossover

Rollover

Straight-through

Coaxial

Rollover

200

Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format?

234.17.10.9

234.16.12.10

236.17.12.6

236.17.12.10

236.17.12.10

300

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

Cloud computing

Online collaboration

Bring your own device

Video conferencing

Bring your own device

300

Which type of access is secured on a Cisco router or switch with the enable secret command?

Virtual terminal

Privileged EXEC

AUX port

Console line

Privileged EXEC

300

In computer communication, what is the purpose of message encoding?

To convert information to the appropriate form for transmission

To interpret information

To break large messages into smaller frames

To negotiate correct timing for successful communication

To convert information to the appropriate form for transmission

300

Why are two strands of fiber used for a single fiber optic connection?

The two strands allow the data to travel for longer distances without degrading.

They prevent crosstalk from causing interference on the connection.

They increase the speed at which the data can travel.

They allow for full-duplex connectivity.

They allow for full-duplex connectivity.

300

How many binary bits exist within an IPv6 address?

32

48

64

128

256

128

400

What is an ISP?

It is a standards body that develops cabling and wiring standards for networking.

It is a protocol that establishes how computers within a local network communicate.

It is an organization that enables individuals and businesses to connect to the Internet.

It is a networking device that combines the functionality of several different networking devices in one.

It is an organization that enables individuals and businesses to connect to the Internet.

400

What is the default SVI on a Cisco switch?

VLAN1

VLAN99

VLAN100

VLAN999

VLAN1

400

Which message delivery option is used when all devices need to receive the same message simultaneously?

Duplex

Unicast

Multicast

Broadcast

Broadcast

400

Which procedure is used to reduce the effect of crosstalk in copper cables?

Requiring proper grounding connections

Twisting opposing circuit wire pairs together

Wrapping the bundle of wires with metallic shielding

Designing a cable infrastructure to avoid crosstalk interference

Avoiding sharp bends during installation

Twisting opposing circuit wire pairs together

400

What is the binary equivalent of the decimal number 232?

11101000

11000110

10011000

11110010

11101000

500

In which scenario would the use of a WISP be recommended?

An Internet cafe in a city

A farm in a rural area without wired broadband access

Any home with multiple wireless devices

An apartment in a building with cable access to the Internet

A farm in a rural area without wired broadband access

500

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

doneThe hostname should be fewer than 64 characters in lengthsignal_cellular_4_bar

The hostname should be written in all lower case characters

doneThe hostname should contain no spacessignal_cellular_4_bar

The hostname should end with a special character

doneThe hostname should begin with a letter

The hostname should be fewer than 64 characters in lengths

The hostname should contain no spaces

The hostname should begin with a letter

500

What are two benefits of using a layered network model? (Choose two.)

It assists in protocol design

It speeds up packet delivery.

It prevents designers from creating their own model.

It prevents technology in one layer from affecting other layers

It ensures a device at one layer can function at the next higher layer.

It assists in protocol design

It prevents technology in one layer from affecting other layers

500

What is one advantage of using fiber optic cabling rather than copper cabling?

It is usually cheaper than copper cabling.

It is able to be installed around sharp bends.

It is easier to terminate and install than copper cabling.

It is able to carry signals much farther than copper cabling.

It is able to carry signals much farther than copper cabling.

500

Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)

IPv6 addresses are represented by hexadecimal numbers.

IPv4 addresses are represented by hexadecimal numbers.

IPv6 addresses are 32 bits in length.

IPv4 addresses are 32 bits in length.

IPv4 addresses are 128 bits in length.

IPv6 addresses are 64 bits in length.

IPv6 addresses are represented by hexadecimal numbers.

IPv4 addresses are 32 bits in length.

M
e
n
u