Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions- Module 1 – with explanations

Posted on June 30, 2009. Filed under: CCNA, Cisco ICND1 Exam Modules, Practice Exam |


Exam Source

Legend
answer   Correct answer
  Your answer, Correct.
  Your answer, Incorrect.
 
1. Which three statements about networks are accurate? (Choose three.)
Networks are used to transmit data in many kinds of environments, including homes, small businesses, and large enterprises.          
A main office can have hundreds or even thousands of people who depend on network access to do their jobs.          
A network is a connected collection of devices that can communicate with each other.          
  A main office usually has one large network to connect all users.          
  The purpose of a network is to create a means to provide all workers with access to all information and components that are accessible by the network.          
  Remote locations cannot connect to a main office through a network.          
2. What is the purpose of a router?
to interconnect networks and choose the best paths between them          
  to provide the connection points for the media          
  to serve as the end point in the network, sending and receiving data          
  to provide the means by which the signals are transmitted from one networked device to another          
3. What is the purpose of a switch?
  to connect separate networks and filter the traffic over those networks so that the data is transmitted through the most efficient route          
  to choose the path over which data is sent to its destination          
  to serve as the end point in the network, sending and receiving data          
to provide network attachment to the end systems and intelligent switching of the data within the local network          
4. What is the purpose of network interconnections?
  to connect separate networks and filter the traffic over those networks so that the data is transmitted through the most efficient route          
  to choose the path over which data is sent to its destination          
to provide a means for data to travel from one point to another in the network          
  to provide network attachment to the end systems and intelligent switching of the data within the local network          
5. Which resource is not sharable on a network?
memory          
  applications          
  peripherals          
  storage devices          
6. Which three of the following are common network applications? (Choose three.)
e-mail          
collaboration          
  graphics creation          
database          
  word processing          
  spreadsheets          
7a Indicates how easily users can access the network
  Speed          
  Cost          
  Security          
Availability          
  Scalability          
  Reliability          
  Topology          
7b. Indicates how dependable the network is
  Speed          
  Cost          
  Security          
  Availability          
  Scalability          
Reliability          
  Topology          
7c. Indicates the protection level of the network itself and the data that is transmitted
  Speed          
  Cost          
Security          
  Availability          
  Scalability          
  Reliability          
  Topology          
7d. Indicates how fast data is transmitted over the network
Speed          
  Cost          
  Security          
  Availability          
  Scalability          
  Reliability          
  Topology          
7e. Indicates how well the network can accommodate more users or data transmission requirements
  Speed          
  Cost          
  Security          
  Availability          
Scalability          
  Reliability          
  Topology          
7f. Indicates the structure of the network
  Speed          
  Cost          
  Security          
  Availability          
  Scalability          
  Reliability          
Topology          
7g. Indicates the general price of components, installation, and maintenance of the network
  Speed          
Cost          
  Security          
  Availability          
  Scalability          
  Reliability          
  Topology          
8. Which two statements about physical networking topologies are accurate? (Choose two)
A physical topology defines the way in which the computers, printers, network devices, and other devices are connected.          
There are three primary categories of physical topologies: bus, ring, and star.          
  A physical topology describes the paths that signals travel from one point on a network to another.          
  The choice of a physical topology is largely influenced by the type of data to be transmitted over the network.          
9. Which statement about logical topologies is accurate?
  A logical topology defines the way in which the computers, printers, network devices, and other devices are connected.          
  A logical topology depends solely on the type of computers to be included in the network.          
A logical topology describes the paths that the signals travel from one point on a network to another          
  A network cannot have different logical and physical topologies.          
10a. All of the network devices connect directly to each other in a linear fashion.
  Star          
Bus          
  Mesh          
  Ring          
  Partial-mesh          
  Dual-ring          
10b. All of the network devices are directly connected to one central point with no other connections between them.
Star          
  Bus          
  Mesh          
  Ring          
  Partial-mesh          
  Dual-ring          
10c. All of the devices on a network are connected in the form of a circle.
  Star          
  Bus          
  Mesh          
Ring          
  Partial-mesh          
  Dual-ring          
10d. Each device has a connection to all of the other devices
  Star          
  Bus          
Mesh          
  Ring          
  Partial-mesh          
  Dual-ring          
10e. At least one device maintains multiple connections to other devices.
  Star          
  Bus          
  Mesh          
  Ring          
Partial-mesh          
  Dual-ring          
10f. This design adds redundancy to the network.
  Star          
  Bus          
  Mesh          
  Ring          
  Partial-mesh          
Dual-ring          
11. Which two statements about wireless networks are accurate? (Choose two.)
Instead of cables, wireless communication uses RFs or infrared waves to transmit data.          
To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.          
  For wireless LANs, a key component is a router, which propagates signal distribution.          
  Wireless networks are not very common, and generally only large corporations use them.          
12. What is the main threat to a closed network?
  a deliberate attack from outside          
a deliberate or accidental attack from inside          
  misuse by customers          
  misuse by employees          
13. Which two factors have recently influenced the increase in threats from hackers? (Choose two.)
  Hacker tools require more technical knowledge to use.          
Hacker tools have become more sophisticated.          
  The number of reported security threats has remained constant year to year.          
Hacker tools require less technical knowledge to use.          
14. Which of the following four attacks are classified as access attacks?
password attacks          
  DDoS          
  Trojan horse          
  Love Bug          
15. Which two statements about the purpose of the OSI model are accurate? (Choose two.)
The OSI model defines the network functions that occur at each layer.          
The OSI model facilitates an understanding of how information travels throughout a network.          
  The OSI model ensures reliable data delivery through its layered approach.          
  The OSI model allows changes in one layer to affect the other layers.          
16a. Provides connectivity and path selection between two host systems that may be located on geographically separated networks
  Physical          
  Datalink          
Network          
  Transport          
  Session          
  Presentation          
  Application          
16b. Ensures that the information sent at the application layer of one system is readable by the application layer of another system
  Physical          
  Datalink          
  Network          
  Transport          
  Session          
Presentation          
  Application          
16c. Defines how data is formatted for transmission and how access to the network is controlled
  Physical          
Datalink          
  Network          
  Transport          
  Session          
  Presentation          
  Application          
16d. Segments data from the system of the sending host and reassembles the data into a data stream on the system of the receiving host
  Physical          
  Datalink          
  Network          
Transport          
  Session          
  Presentation          
  Application          
16e. Defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems
Physical          
  Datalink          
  Network          
  Transport          
  Session          
  Presentation          
  Application          
16f. Provides network services to the applications of the user, such as e-mail, file transfer, and terminal emulation
  Physical          
  Datalink          
  Network          
  Transport          
  Session          
  Presentation          
Application          
16g. Establishes, manages, and terminates sessions between two communicating hosts and also synchronizes dialogue between the presentation layers of the two hosts and manages their data exchange
  Physical          
  Datalink          
  Network          
  Transport          
Session          
  Presentation          
  Application          
17a. The presentation layer adds the presentation layer header (Layer 6 header) to the data. This then becomes the data that is passed down to the session layer.
  Step 1          
  Step 2          
Step 3          
  Step 4          
  Step 5          
  Step 6          
  Step 7          
  Step 8          
17b. The session layer adds the session layer header (Layer 5 header) to the data. This then becomes the data that is passed down to the transport layer.
  Step 1          
  Step 2          
  Step 3          
Step 4          
  Step 5          
  Step 6          
  Step 7          
  Step 8          
17c. The application layer adds the application layer header (Layer 7 header) to the user data. The Layer 7 header and the original user data become the data that is passed down to the presentation layer.
  Step 1          
Step 2          
  Step 3          
  Step 4          
  Step 5          
  Step 6          
  Step 7          
  Step 8          
17d. The network layer adds the network layer header (Layer 3 header) to the data. This then becomes the data that is passed down to the data link layer.
  Step 1          
  Step 2          
  Step 3          
  Step 4          
  Step 5          
Step 6          
  Step 7          
  Step 8          
17e. The transport layer adds the transport layer header (Layer 4 header) to the data. This then becomes the data that is passed down to the network layer.
  Step 1          
  Step 2          
  Step 3          
  Step 4          
Step 5          
  Step 6          
  Step 7          
  Step 8          
17f. The user data is sent from an application to the application layer.
Step 1          
  Step 2          
  Step 3          
  Step 4          
  Step 5          
  Step 6          
  Step 7          
  Step 8          
17g. The data link layer adds the data link layer header and trailer (Layer 2 header and trailer) to the data. A Layer 2 trailer is usually the frame check sequence, which is used by the receiver to detect whether the data is in error. This then becomes the data that is passed down to the physical layer.
  Step 1          
  Step 2          
  Step 3          
  Step 4          
  Step 5          
  Step 6          
Step 7          
  Step 8          
17h. The physical layer then transmits the bits onto the network media.
  Step 1          
  Step 2          
  Step 3          
  Step 4          
  Step 5          
  Step 6          
  Step 7          
Step 8          
18. At which layer does de-encapsulation first occur?
  application          
datalink          
  network          
  transport          
19a. Encapsulates the network layer packet in a frame
  Network layer          
Datalink layer          
  Physical layer          
19b. Moves the data through the internetwork by encapsulating the data and attaching a header to create a packet
Network layer          
  Datalink layer          
  Physical layer          
19c. Encodes the data-link frame into a pattern of 1s and 0s (bits) for transmission on the medium (usually a wire)
  Network layer          
  Datalink layer          
Physical layer          
20. What is the function of a network protocol?
uses sets of rules that tell the services of a network what to do          
  ensures reliable delivery of data          
  routes data to its destination in the most efficient manner          
  is a set of functions that determine how data is defined          
21a. Provides applications for file transfer, network troubleshooting, and Internet activities, and supports the network
  Physical layer          
  Datalink layer          
  Internet layer          
  Transport layer          
Application layer          
21b. Defines how data is formatted for transmission and how access to the network is controlled
  Physical layer          
Datalink layer          
  Internet layer          
  Transport layer          
  Application layer          
21c. Defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems
Physical layer          
  Datalink layer          
  Internet layer          
  Transport layer          
  Application layer          
21d. Provides routing of data from the source to a destination by defining the packet and addressing scheme, moving data between the data link and transport layers, routing packets of data to remote hosts, and performing fragmentation and reassembly of data packets
  Physical layer          
  Datalink layer          
Internet layer          
  Transport layer          
  Application layer          
21e. Provides communication services directly to the application processes running on different network hosts
  Physical layer          
  Datalink layer          
  Internet layer          
Transport layer          
  Application layer          
22. Which area of the OSI model and the TCP/IP stack is most diverse?
  network layer          
  transport layer          
application layer          
  data link layer          
23. How many bits are in an IPv4 address?
  16          
32          
  48          
  64          
  128          
24. In a Class B address, which of the octets are the host address portion and are assigned locally?
  The first octet is assigned locally.          
  The first and second octets are assigned locally.          
  The second and third octets are assigned locally.          
The third and fourth octets are assigned locally.          
25. The address 172.16.128.17 is of which class?
  Class A          
Class B          
  Class C          
  Class D          
26. Which of the following statements is true of a directed-broadcast address?
  A broadcast address is an address that has all 0s in the host field.          
  Any IP address in a network can be used as a broadcast address.          
A directed broadcast address is an address that has all 1s in the host field.          
  None of the above is correct.          
27. Which two of these addresses are private IP addresses? (Choose two.)
10.215.34.124          
  127.16.71.43          
172.17.10.10          
  225.200.15.10          
28. Which three statements about IP are accurate? (Choose three.)
IP is a connectionless protocol.          
  IP uses relational addressing.          
  IP delivers data reliably          
  IP operates at Layer 2 of the TCP/IP stack and OSI model.          
IP does not provide any recovery functions.          
IP delivers data on a best-effort basis.          
29. Which three statements about TCP are accurate? (Choose three.)
  TCP operates at Layer 3 of the TCP/IP stack.          
TCP is a connection-oriented protocol.          
  TCP provides no error checking.          
TCP packets are numbered and sequenced so that the destination can reorder packets and determine if a packet is missing.          
  TCP provides no recovery service.          
Upon receipt of one or more TCP packets, the receiver returns an acknowledgement to the sender indicating that it received the packets.          
30. In the OSI model, which characteristic is similar between TCP and UDP?
operates at Layer 4 (transport layer) of the OSI model and the TCP/IP stack          
  capable of performing a very limited form of error checking          
  provides service on a best-effort basis and does not guarantee packet delivery          
  provides no special features that recover lost or corrupted packets          
31. When a single computer with one IP address has several websites open at once, this is called _____.
  windowing          
session multiplexing          
  segmenting          
  connection-oriented protocol          
32. TCP is best for which two of the following applications? (Choose two.)
E-mail          
  voice streaming          
downloading          
  video streaming          
33. Which three of the following characteristics apply to UDP? (Choose three.)
Packets are treated independently.          
  Packet delivery is guaranteed.          
Packet delivery is not guaranteed          
Lost or corrupted packets are not resent          
34. Which two of the following characteristics apply to TCP? (Choose two.)
  Packet delivery is not guaranteed.          
  Lost or corrupted packets are not resent.          
Lost or corrupted packets are resent.          
TCP segment contains a sequence number and an acknowledgment number.          
35. Proprietary applications use which kind of port?
  dynamically assigned ports          
  well-known ports          
registered ports          
36. Ports that are used only for the duration of a specific session are called _____.
dynamically assigned ports          
  well-known ports          
  registered ports          
37. The source port in both a UDP header and a TCP header is a _____.
  16-bit number of the called port          
  16-bit length of the header          
  16-bit sum of the header and data fields          
16-bit number of the calling port          
38. Which field in a TCP header ensures that data arrives in correct order?
  acknowledgement number          
sequence number          
  reserved          
  options          
39. In a TCP connection setup, the initiating device sends what?
  ACK          
  receive SYN          
send SYN          
40. Acknowledgment and windowing are two forms of _____.
flow control          
  TCP connection          
  TCP sequencing          
  reliable connections          
41. Windowing provides which of the following services?
  The sender can multiplex          
  The receiver can have outstanding acknowledgments.          
  The receiver can multiplex          
The sender can transmit a specified number of unacknowledged segments.          
42. Sequence numbers and acknowledgment numbers are found where?
  UDP header          
TCP header          
  in the initial sequence number          
  application layer          
43. What organization is responsible for Ethernet standards?
  ISO          
IEEE          
  EIA          
  IEC          
44. What are two characteristics of Ethernet 802.3? (Choose two.)
based on the CSMA/CD process          
  a standard that has been replaced by Ethernet II          
  specifies the physical layer (Layer 1)          
  developed in the mid-1970s          
specifies the MAC portion of the data link layer (Layer 2)          
  also referred to as thick Ethernet          
45. Which statement about MAC addresses is accurate?
A MAC address is a number in hexadecimal format that is physically located on the NIC.          
  A MAC address is represented by hexadecimal digits that are organized in pairs          
  It is not necessary for a device to have a unique MAC address to participate in the network.          
  The MAC address can never be changed          
46. Which minimum category of UTP is required for Ethernet 1000BASE-T?
  Category 3          
  Category 4          
Category 5          
  Category 5e          
47a. Capable of transmitting data at speeds up to 100 Mbps
  Category 1          
  Category 2          
  Category 3          
  Category 4          
Category 5          
  Category 5e          
  Category 6          
47b. Used in networks running at speeds up to 1000 Mbps requiring improved far end crosstalk performance.
  Category 1          
  Category 2          
  Category 3          
  Category 4          
  Category 5          
Category 5e          
  Category 6          
47c. Is expected to support 10GBASE-T, but with distance limitations
  Category 1          
  Category 2          
  Category 3          
  Category 4          
  Category 5          
  Category 5e          
Category 6          
47d. Used for telephone communications; not suitable for transmitting data
Category 1          
  Category 2          
  Category 3          
  Category 4          
  Category 5          
  Category 5e          
  Category 6          
47e. Used in Token Ring networks; can transmit data at speeds up to 16 Mbps
  Category 1          
  Category 2          
  Category 3          
Category 4          
  Category 5          
  Category 5e          
  Category 6          
47f. Capable of transmitting data at speeds up to 4 Mbps
  Category 1          
Category 2          
  Category 3          
  Category 4          
  Category 5          
  Category 5e          
  Category 6          
47g. Used in 10BASE-T networks; can transmit data at speeds up to 10 Mbps
  Category 1          
  Category 2          
Category 3          
  Category 4          
  Category 5          
  Category 5e          
  Category 6          
48. Which three characteristics pertain to UTP? (Choose three.)
  UTP cable is an eight-pair wire.          
An insulating material covers each of the individual copper wires in UTP cable.          
  The wires in each pair are wrapped around each other.          
  Expensive to install due to use of large gauge copper conductors.          
Susceptible to electromagnetic interference.          
38291 participants so far
Number answered correctly: 83 out of 86
Advertisements

Make a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

2 Responses to “Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions- Module 1 – with explanations”

RSS Feed for IT Certifications Comments RSS Feed

[…] (June 2009) and it says that "application layer" is the correct answer to the question. Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions- Module 1 – wit… This website says the data link layer is most diverse (though it does not qualify the statement). […]

[…] https://kl2217.wordpress.com/2009/06/30/answers-for-interconnecting-cisco-networking-devices-icnd-pr… xxxxx Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions- Module 1 -; with explanations […]


Where's The Comment Form?

Liked it here?
Why not try sites on the blogroll...

%d bloggers like this: