CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (2023)

How to find:Type"Ctrl + F"in the browser and type the question wording to find this question/answer. If the question is not here, find it atquestion bank.

NOTE: If you have the new question for this test, please comment the list of questions and multiple choice in the form below this article. We will update the answers for you shortly. Thank you very much! We really appreciate your contribution to the site.

Introduction to Networking (Version 7.00) - Modules 1 - 3: Basic Network Connectivity and Communication Testing

1. During a routine inspection, a technician discovered that software installed on a computer was secretly collecting data about websites visited by the computer's users. What kind of threat is affecting this computer?

  • DoS attack
  • identity theft
  • Spyware
  • Zero-Day-Angriff

2. Which term refers to a network that provides secure access to corporate offices for suppliers, customers, and employees?

  • Internet
  • Intranet
  • Extranet
  • extensive network

3. A large company changed its network to allow users to access network resources from their personal laptops and smartphones. Which networking trend does this describe?

  • Cloud Computing
  • online collaboration
  • Bring your own device
  • video conference

4. What is an ISP?

  • This is a standards organization that develops wiring and cabling standards for networks.
  • It is a protocol that defines how computers communicate within a local network.
  • It is an organization that provides individuals and businesses with access to the Internet.
  • It is a network device that combines the functionality of several different network devices into one.

5. Match the requirements of a reliable network with the supporting network architecture. (Not all options are used.)

6. A store clerk creates a quote for a customer. To do this, the employee must access confidential price information from internal servers at headquarters. What kind of network will the employee have access to?

  • an intranet
  • the Internet
  • an extranet
  • a local network

Explanation:An "Intranet" is a private LAN and WAN connection owned by an organization. An intranet is designed to be accessible only to members, employees, or other authorized individuals of the organization.

7. Which statement describes the use of Powerline network technology?

  • New "smart" electrical wiring is used to extend an existing home local area network.
  • A home local area network is installed without physical wiring.
  • A device connects to an existing home LAN via an adapter and an existing socket.
  • Wireless access points use powerline adapters to distribute data over the home LAN.

Explanation:Powerline networks provide the ability to connect a device to the network using an adapter where there is an outlet. The network uses existing electrical wiring to send data. It doesn't replace physical wiring, but it can add functionality in places where wireless access points can't be used or devices can't reach.​

8. A network engineer works on the wireless network of a medical clinic. The technician accidentally configures the wireless network to allow patients to view other patients' medical records. Which of the four network properties was violated in this situation?

  • fault tolerance
  • scalability
  • Security
  • Quality of Service (QoS)
  • reliability

Explanation:Network security involves protecting the privacy of data on the network. In this case, since the confidential data has become accessible to unauthorized users, the security property of the network is violated.

9. Assign each property to the appropriate Internet connection type. (Not all options are used.)

CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (2)

ITN (Version 7.00) - Basic Network Connectivity and Communications Check 5

Explanation:DSL is an always-on high-bandwidth connection that runs over telephone lines. Cable uses the same coaxial cable that carries television signals into the home to provide Internet access. A dial-up phone is much slower than DSL or cable, but is the cheapest option for home users because it can use any phone line and a simple modem. The satellite requires a clear line of sight and is obstructed by trees and other obstacles. None of these standard residential options use dedicated leased lines like T1/E1 and T3/E3.

10. Which two criteria help in choosing a network medium from among different network media? (Choose two.)

  • which data types should be prioritized
  • the cost of end devices used in the network
  • the distance over which the chosen medium can successfully transmit a signal
  • the number of intermediate devices installed in the network
  • the environment in which the selected media is to be installed

Explanation:Criteria for selecting a network medium include the distance over which the selected medium can successfully transmit a signal, the environment in which the selected medium is to be installed, the amount of data and the speed at which the signals must be transmitted. data and cost The medium and its installation.

11. What kind of network traffic requires QoS?

  • e-mail
  • online market
  • video conference
  • Wiki

12. A user is implementing security on a small office network. Which two measures would meet the minimum security requirements for this network? (Choose two.)

  • Firewall implementation
  • Wireless network installation
  • Install anti-virus software
  • Implementation of intrusion detection system
  • Add special intrusion prevention device

Explanation:Technically complex security measures such as intrusion prevention and intrusion prevention systems are typically associated with corporate networks rather than home networks. Installing anti-virus software, anti-malware software, and implementing a firewall are usually the minimum requirements for home networks. Installing a wireless home network does not improve network security and requires additional security measures.

13. Passwords can be used to restrict access to all or part of Cisco IOS. Select the functions and interfaces that can be protected with passwords. (Choose three.)

  • VTY interface
  • console interface
  • Ethernet interface
  • Boot into IOS mode
  • privileged EXEC mode
  • Router configuration mode

Explanation:Access to the VTY and console interfaces can be restricted using passwords. Router out-of-band management can be restricted to both user EXEC and privileged EXEC modes.

14. Which interface allows remote management of a Layer 2 switch?

  • the AUX interface
  • the console port interface
  • the virtual interface of the switch
  • the first Ethernet port interface

Explanation:On a Layer 2 switch, there is a Switch Virtual Interface (SVI) that provides a way to remotely manage the device.

15. What is the function of pressing the Tab key when entering a command in IOS?

  • Cancels the current command and returns to configuration mode.
  • Exits configuration mode and returns to user EXEC mode.
  • Moves the cursor to the beginning of the next line.
  • Completes the rest of a partially typed word in a command.

Explanation:Pressing Tab after typing part of a command causes IOS to execute the rest of the command.

16. While trying to troubleshoot a network problem, a technician made several changes to the router's current configuration file. The changes did not fix the problem and were not saved. What actions can the technician take to discard the changes and work with the file in NVRAM?

  • Issue the reload command without saving the current configuration.
  • Delete the vlan.dat file and reboot the device.
  • Close and reopen the terminal emulation software.
  • Issue the "copy Startup-Config Running-Config" command.

Explanation:The engineer does not want to make a mistake when trying to remove any changes made to the current configuration file. The solution is to reboot the router without saving the running settings. The "copy restart-config running-config" command does not replace the current configuration file with the configuration file stored in NVRAM, but only has an additional effect.

17. An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What are these keyboard shortcuts used for?

  • to restart the ping process
  • to stop the ping process
  • to switch to another configuration mode
  • so that the user can execute the command

Explanation:To stop an IOS process, such as ping or traceroute, a user enters the Ctrl-Shift-6 key combination. Tab completes the rest of the parameters or arguments in a command. To switch from configuration mode to privileged mode, use the keyboard shortcut Ctrl-Z. CTRL-R redisplays the line you just typed, making it easier for the user to press Enter and ping again.

18. See the report. A network administrator configures access control for switch SW1. If the administrator uses a console connection to connect to the switch, what password is required to access user EXEC mode?

CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (3)

CCNA-1-v7-Modules-1-3-Basic Network Connectivity and Communications Prüfungsantworten 14

  • later
  • secret
  • linecon
  • linevtyin

Explanation:Telnet accesses a network device through the virtual interface configured with the VTY line command. The password set here is required to access user EXEC mode. The password set with the Line Console 0 command is required to gain access through the console port, and the power-on and power-on secrets are used to allow access to privileged EXEC mode.

19. A technician configures a switch with these commands:

SwitchA(config)# Interface VLAN 1SwitchA(config-if)# IP address 192.168.1.1 255.255.255.0SwitchA(config-if)# no shutdown

What does the technician adjust?

  • Telnet access
  • IN THE
  • password encryption
  • physical access to the switch port

Explanation:For a switch to have an IP address, a virtual switch interface must be configured. This allows remote management of the switch over the network.

20. What command or key combination can a user use to return to the previous level of the command hierarchy?

  • End
  • exit
  • Strg-Z
  • Strg-C

Explanation:Exit and CTRL-Z return the user to privileged EXEC mode. Ctrl-C terminates a command in progress. The exit command returns the user to the previous level.

21. What are the two characteristics of RAM in a Cisco device? (Choose two.)

  • RAM provides non-volatile storage.
  • The configuration that is actively running on the device is stored in RAM.
  • The contents of RAM are lost during a power cycle.
  • RAM is a component in Cisco switches but not in Cisco routers.
  • RAM can store multiple versions of IOS and configuration files.

Explanation:RAM stores data used by the device to support networking. The current configuration is stored in RAM. This type of memory is considered volatile memory because data is lost when it is turned off and on. Flash memory stores the IOS and delivers a copy of the IOS to RAM when a device is powered on. Flash memory is non-volatile as it retains the stored content even in the event of a power outage.

22. Which two hostnames follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)

  • Branch 2!
  • RM-3-switch-2A4
  • Floor (15)
  • HO Floor 17
  • SwBranch799

Explanation:Some guidelines for naming conventions are: Names should:
Start with a letter
Does not contain spaces
End with a letter or number
Use only letters, numbers and dashes
The length can be less than 64 characters

23. How does SSH differ from Telnet?

  • SSH establishes connections over the network, while Telnet is for out-of-band access.
  • SSH provides security for remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plain text.
  • SSH requires the use of the PuTTY terminal emulator. Tera Term must be used to connect to devices via Telnet.
  • SSH must be configured over an active network connection, while Telnet is used to connect to a device via a console connection.

Explanation:SSH is the preferred protocol for connecting to a device's operating system over a network because it is much more secure than Telnet. Both SSH and Telnet are used to connect to devices over the network and are therefore both used in-band. Both SSH and Telnet connections can be established with PuTTY and Terra Term.

24. An administrator configures a switch console port with a password. In what order does the administrator go through the IOS modes to get to the mode where the configuration commands are entered? (Not all options are used.)

CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (4)

CCNA-1-v7-Modules-1-3-Basic Network Connectivity and Communications Prüfungsantworten 24

Explanation:The configuration mode that the administrator will first encounter is user EXEC mode. AfterMake it possibleWhen the command is entered, the next mode is privileged EXEC mode. From there itconfigure the terminalsThe l command is entered to enter global configuration mode. Finally, the administrator enters itconsole line 0Command to enter the mode in which the configuration is entered.

25. What are the three characteristics of an SVI? (Choose three.)

  • It is designed as a security protocol to protect switch ports.
  • It is not associated with any physical interface on a switch.
  • It is a special interface that allows the connectivity of different types of media.
  • It is necessary to enable the connectivity of each device in each location.
  • Provides the ability to remotely manage a switch.
  • It is assigned to VLAN1 by default.

Explanation:Switches have one or more switch virtual interfaces (SVIs). SVIs are created in software because there is no physical hardware associated with them. Virtual interfaces provide the ability to remotely manage a switch over a network using IP. Each switch comes with an SVI that appears out of the box in the default configuration. The default SVI interface is VLAN1.

26. Which command is used to check the status of switch interfaces, including the status of the interfaces and a configured IP address?

  • ipconfig
  • Ring
  • Traceroute
  • Display a brief description of the IP interface

Explanation:The show ip interface brief command displays a brief summary of the device interface status. The ipconfig command is used to control TCP/IP properties on a host computer. The ping command is used to verify layer 3 connectivity. The traceroute command is used to trace the network path from source to destination.

27. Match the description to the relevant IOS feature. (Not all options are used.)

28. Map the definitions to the corresponding CLI hotkeys and shortcuts. (Not all options are used.)
CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (6)

Explanation:The key combinations with their functions are as follows:
– Tab – Completes the remainder of a partially entered command or keyword
- Spacebar - displays the next screen
– ? - Provides context-sensitive help
– Up Arrow - Allows the user to scroll back through previous commands
– Ctrl-C – cancels all entered commands and returns directly to privileged EXEC mode
- Ctrl-Shift-6 - Allows the user to stop an IOS process such as ping or traceroute

29. What part of the syntax is represented by "running-config" in the "show running-config" command?

  • the order
  • a keyword
  • a variable
  • a prompt

Explanation:The first part of the syntax, show, is the command, and the second part of the syntax, running-config, is the keyword. The keyword specifies what will be displayed as the output of the display command.

30. After making configuration changes to a Cisco switch, a network administrator issues the "copy running-config restart-config" command. What is the output of this command?

  • The new configuration is saved in flash memory.
  • The new configuration is loaded when the switch reboots.
  • The current IOS file will be replaced with the newly configured file.
  • The configuration changes are removed and the original configuration is restored.

Explanation:With theCopy the running-config-startup-configThe command replaces the contents of the current operating configuration with the boot configuration file stored in NVRAM. The configuration file stored in NVRAM is loaded when the device is restarted.

31. Which command prevents all unencrypted passwords in a configuration file from being displayed in clear text?

  • (config)# Enable secret password
  • (config)# enable Secret Secret_Password
  • (config-line)# Passwortgeheimnis
  • (config)# Encrypt service password
  • (config)# enable secret Encrypted_Password

Explanation:To prevent all configured passwords from appearing in clear text in the configuration files, an administrator can run the password encryption service command. This command encrypts all configured passwords in the configuration file.

32. A network administrator enters the service password encryption command in the configuration mode of a router. What does this command do?

  • This command encrypts passwords as they are transmitted over serial WAN connections.
  • This command prevents anyone from seeing the running configuration passwords.
  • This command enables a strong encryption algorithm for the Enable Secret Password command.
  • This command automatically encrypts passwords in configuration files currently stored in NVRAM.
  • This command provides a unique encrypted password for external service personnel responsible for maintaining the router.

Explanation:The startup-config and running-config files display most passwords in clear text. Use the global configuration password-service-encryption command to encrypt all cleartext passwords in these files.

33. What method can two computers use to ensure that packets are not dropped because too much data is being sent too quickly?

  • Encapsulation
  • flow control
  • access method
  • Response timed out

Explanation:For two computers to communicate effectively, there must be a mechanism that allows both the source and the destination to determine when data is being transmitted and received. Flow control makes this possible by ensuring that data is not sent too quickly to be received properly.

34. Which statement accurately describes a TCP/IP encapsulation process when a computer sends data over the network?

  • Data is sent from the internet layer to the network access layer.
  • Packets are sent from the network access layer to the transport layer.
  • Segments are sent from the transport layer to the internet layer.
  • Frames are sent from the network access layer to the Internet layer.

Explanation:When data is transferred from the computer to the network, the transport layer sends segments to the internet layer. The internet layer sends packets to the network access layer, which creates frames and then converts them into bits. Bits are released within the network.

35. Which three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

  • ARP
  • DHCP
  • DNS
  • FTP
  • NAT
  • PPP

Explanation:DNS, DHCP, and FTP are all application layer protocols in the TCP/IP protocol suite. ARP and PPP are network access layer protocols and NAT is an Internet layer protocol in the TCP/IP protocol suite.

36. Match the description with the organization. (Not all options are used.)
CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (7)

Explanation:EIA is an international standards and trade organization for electronics companies. It is best known for its standards for electrical wiring, connectors and 19-inch racks for mounting network equipment.

37. What name is given to the PDU transport layer?

  • Bits
  • Data
  • frame
  • Packet
  • Department

Explanation:Application data is routed through the protocol stack en route to being transmitted over the network medium. During the process, various protocols fill in information at each level. At each stage of the process, a PDU (Protocol Data Unit) is given a different name to reflect its new capabilities. PDUs are named according to the protocols of the TCP/IP suite:
Data - The general term for the PDU used at the application layer.
Segment - PDU transport layer
Packet - PDU network layer
Frame - Data Link Layer PDU
Bit - A physical PDU layer used in the physical transmission of data over the medium

38. When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

  • DNS-Serveradresse
  • subnet mask
  • Standard-Gateway
  • DHCP-Serveradresse

Explanation:When configuring IPv4 for an end device, several items must be entered:
IPv4 address - uniquely identifies an end device on the network
Subnet Mask - Specifies the network address portion and host portion of an IPv4 address
Default gateway - the IP address of the router's interface used to communicate with hosts on another network
DNS-Serveradresse – Die IP-Adresse des Domain Name System (DNS)-Servers
The DHCP server address (if DHCP is used) is not manually configured on the end devices. Provided by a DHCP server when an end device requests an IP address.

39. What is the process of placing a PDU inside another PDU?

  • Encapsulation
  • codification
  • segmentation
  • flow control

Explanation:When a message is inserted into another message, this is called encapsulation. In networks, encapsulation occurs when a protocol data unit is transmitted in the data field of the next lower protocol data unit.

40. In the TCP/IP model, which layer is responsible for routing messages on an Internet network?

  • Internet
  • Transport
  • network access
  • meeting

Explanation:The TCP/IP model consists of four layers: Application, Transport, Internet, and Network Access. Of these four layers, the Internet layer is responsible for routing messages. The session layer is not part of the TCP/IP model, but part of the OSI model.

41. For the TCP/IP protocol suite, what is the correct sequence of events when preparing a telnet message to be sent over the network?

CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (8)

CCNA-1-v7-Modules-1-3-Basic Network Connectivity and Communications Prüfungsantworten 41

42. Which PDU format is used when bits from the network medium are received by a host's NIC?

  • file
  • frame
  • Packet
  • Department

Explanation:When received at the physical layer of a host, the bits are formatted into a frame at the data link layer. A packet is the PDU at the network layer. A segment is the PDU at the transport layer. A file is a data structure that can be used at the application level.

43. See report. ServerB tries to contact HostA. Which two statements correctly identify the address that ServerB creates in the process? (Choose two.)

CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (9)

  • ServerB creates a packet with the destination IP address of RouterB.
  • ServerB creates a frame with the destination MAC address of SwitchB.
  • ServerB creates a packet with the destination IP address of RouterA.
  • ServerB creates a frame with the destination MAC address of RouterB.
  • ServerB creates a packet with the destination IP address of HostA.
  • ServerB creates a frame with RouterA's destination MAC address.

Explanation:To send data to HostA, ServerB creates a packet containing the IP address of the destination device on the remote network and a frame containing the MAC address of the default gateway device on the local network.

44. What method can a computer use to respond appropriately when it requests data from a server and the server takes too long to respond?

  • Encapsulation
  • flow control
  • access method
  • Response timed out

Explanation:When a computer makes a request and does not receive a response within a reasonable amount of time, the computer assumes that there is no response and responds accordingly.

45. A web client receives a response for a web page from a web server. On the client side, what is the correct order of the protocol stack used to decode the received transmission?

  • Ethernet, IP, TCP, HTTP
  • HTTP, TCP, IP, Ethernet
  • Ethernet, TCP, IP, HTTP
  • HTTP, Ethernet, IP, TCP

Explanation:
1. HTTP governs how a web server and client interact.
2. TCP manages individual conversations between web servers and clients.
3. IP is responsible for delivery via the best route to the destination.
4. Ethernet takes the packet from IP and formats it for transmission.

46. ​​Which two layers of the OSI model have the same functionality as a single layer of the TCP/IP model? (Choose two.)

  • Data connection
  • network
  • physically
  • meeting
  • Transport

Explanation:The OSI data link and physical layers together correspond to the TCP/IP network access layer. The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP Internet layer. The OSI application, presentation, and session layers are functionally equivalent to the application layer in the TCP/IP model.

47. At which layer of the OSI model will a logical address be added during encapsulation?

  • natural layer
  • data transmission level
  • network level
  • transport layer

Explanation:Logical addresses, also called IP addresses, are added at the network level. Physical addresses are added at the data link layer. Port addresses are added to the transport layer. No physical layer addresses are added.

48. What is the characteristic of multicast messages?

  • They are sent to a select group of hosts.
  • They are sent to all hosts on a network.
  • They must be recognized.
  • They are shipped to a single destination.

Explanation:Multicast is a type of one-to-many communication. Multicast messages are addressed to a specific multicast group.

49. Which statement about network protocols is correct?

  • Network protocols define the type of hardware used and how it is racked.
  • They define how messages are exchanged between the source and the destination.
  • All operate at the network access layer of TCP/IP.
  • They are only required for exchanging messages between devices on remote networks.

Explanation:Network protocols are implemented in hardware, software, or both. They interact with each other within different layers of a protocol stack. Protocols have nothing to do with the installation of network equipment. Network protocols are required to exchange information between source and destination devices on both local and remote networks.

50. What is the advantage of network devices using open standard protocols?

  • Network communication is limited to data transfer between devices from the same manufacturer.
  • A client host and a server running different operating systems can successfully exchange data.
  • Internet access can be controlled by a single ISP in each market.
  • Competition and innovation are limited to certain product types.

Explanation:An advantage of network devices that implement open standard protocols, such as those from the TCP/IP suite, is that clients and servers running different operating systems can communicate with each other. Open standards protocols facilitate innovation and competition among suppliers and across markets and can reduce the appearance of monopoly in network markets.

51. Which device performs the function of determining the path that messages should take through Internet networks?

  • a router
  • a firewall
  • a web server
  • a DSL modem

Explanation:A router is used to determine the path that messages should take through the network. A firewall is used to filter incoming and outgoing data traffic. A DSL modem is used to provide an Internet connection for a home or organization.

52. Open the PT Activity. Complete the tasks in the activity statement and then answer the question.

CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (10)

CCNA-1-v7-Modules-1-3-Basic Network Connectivity and Communications Prüfungsantworten 52

CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (11)

Modules 1-3: Basic network connectivity and communications testing - Packet Tracer0,00 KB10992 Downloads

...

download

What is the IP address of the switch virtual interface (SVI) on Switch0?

  • 192.168.5.10
  • 192.168.10.5
  • 192.168.10.1
  • 192.168.5.0

Explanation:After the enable command is issued, the show running-configuration command, or show ip interfaces for short, displays the switch virtual interface (SVI) IP address.

53. Why does a Layer 2 switch need an IP address?

  • To allow the switch to send broadcast frames to connected computers
  • To allow the switch to act as the default gateway
  • to enable remote management of the switch
  • To enable the switch to receive frames from connected computers

Explanation:As a Layer 2 device, a switch does not need an IP address to transmit frames to connected devices. However, when a switch is accessed remotely over the network, it must have a Layer 3 address. The IP address must be applied to a virtual interface, not a physical interface. Routers, not switches, act as default gateways.

54. See report. An administrator attempts to configure the switch but receives the error message shown in the exhibit. What is the problem?

CCNA 1 v7 Modules 1-3: Network Connectivity and Communications Basic Exam Answers (12)

CCNA-1-v7-Modules-1-3-Basic Network Connectivity and Communications Prüfungsantworten 54

  • The entire Configure Terminal command must be used.
  • The administrator is already in global configuration mode.
  • The administrator must first enter privileged EXEC mode before issuing the command.
  • The administrator must log in through the console port to access the global configuration mode.

Explanation:To enter global configuration mode, enter the configure terminal command or an abbreviated version such as config t from privileged EXEC mode. In this scenario, the administrator is in user EXEC mode, indicated by the > symbol after the hostname. The administrator should use the enable command to switch to privileged EXEC mode before entering the configure terminal command.

55. What term describes an organization's network that provides secure access to people working for another organization?

  • Extranet
  • clouds
  • BYOD
  • Quality of service

56. Which term describes the storage of personal files on servers on the Internet for access anywhere, anytime, and on any device?

  • clouds
  • BYOD
  • Quality of service
  • converged network

57. What term describes a network in which a computer can be both a client and a server?

  • Peer-to-Peer
  • clouds
  • BYOD
  • Quality of service

58. What term describes a type of network used by people who work from home or a small remote office?

  • SOHO Network
  • BYOD
  • Quality of service
  • converged network

59. Which term describes a computer model that runs server software on dedicated computers?

  • client server
  • Internet
  • Intranet
  • Extranet

61. Which term describes a technology that allows devices to connect to the LAN through an electrical outlet?

  • power line networks
  • Internet
  • Intranet
  • Extranet

62. What term describes a policy that allows network devices to manage data flow so that voice and video are prioritized?

  • Quality of service
  • Internet
  • Intranet
  • Extranet

63. Which term describes a private collection of LANs and WANs owned by an organization?

  • Intranet
  • Internet
  • Extranet
  • Peer-to-Peer

64. Which term describes the ability to use personal devices on a corporate or campus network?

  • BYOD
  • Internet
  • Intranet
  • Extranet

65. At which OSI layer is a source IP address added to a PDU during the encapsulation process?

  • network level
  • data transmission level
  • transport layer
  • application layer

66. At which OSI layer is a destination port number added to a PDU during the encapsulation process?

  • transport layer
  • data transmission level
  • network level
  • application layer

67. At which OSI layer is data added to a PDU during the encapsulation process?

  • application layer
  • data transmission level
  • network level
  • transport layer

68. At which OSI layer is a source IP address added to a PDU during the encapsulation process?

  • network level
  • data transmission level
  • application layer
  • presentation transparency

69. What are all computers connected to a network and directly participating in network communications called?

  • Servant
  • intermediate device
  • host
  • media

Explanation:Host computers are all computers connected to a network that directly participate in network communications.

70. At which OSI layer is a destination IP address added to a PDU during the encapsulation process?

  • network level
  • application layer
  • transport layer
  • presentation transparency

71. At which OSI layer is a source MAC address added to a PDU during the encapsulation process?

  • data transmission level
  • application layer
  • transport layer
  • presentation transparency

72. At which OSI layer is a source port number added to a PDU during the encapsulation process?

  • transport layer
  • application layer
  • network level
  • presentation transparency
  • data transmission level

73. At which OSI layer is a destination MAC address added to a PDU during the encapsulation process?

  • data transmission level
  • transport layer
  • application layer
  • network level

74. Which medium is used to transmit the data when the data is coded as light pulses?

  • Wireless
  • Optical fire wire
  • copper wire

Explanation:Fiber optic cables are the medium used to transmit data when the data is coded as light pulses.

75. Which two devices are intermediate devices? (choose two)

  • host
  • Router
  • switch
  • Servant

Explanation:Routers and switches are intermediate devices.

FAQs

What is the first module of the CCNA? ›

CCNA 1: Introduction to Networks

The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum.

What is the Internet CCNA exam? ›

CCNA stands for Cisco Certified Network Associate, which is a certification you can earn after taking the 120-minute exam administered by Cisco. The exam tests your knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation.

What term describes a type of network when an employee at a remote site needs to access resources at head office? ›

Remote employees access the intranet through a virtual private network (VPN) or another secure connection.

How can I pass CCNA exam in first attempt? ›

  1. Get Practical Experience. You'll need both theoretical and practical knowledge to pass the CCNA exam. ...
  2. Obtain the Proper Study Materials. ...
  3. Schedule Practice Tests. ...
  4. Refresh Your Knowledge Right Before the Exam. ...
  5. Take a Breather. ...
  6. 2 More Things to Keep in Mind:
  7. CCNA is Comprehensive. ...
  8. The CCNA Exam is Quick.
Feb 14, 2023

What is the minimum to pass CCNA? ›

Cisco Certified Network Associate (CCNA) Exam Guide : Total Questions : 60. Passing Score : 800 . Approximately 80% marks are required to pass the exam .

Is CCNA difficult to pass? ›

You may have heard that many people have failed the CCNA exam or claim the exam is tough because they failed. But the truth is that it doesn't matter how much IT experience you have or how familiar you are with tests, preparation is still necessary. If you have prepared for it, you can easily pass the exam.

Is CCNA a pass rate? ›

What Is the Pass Rate of the CCNA Exam? The overall pass rate for the CCNA exam is typically around 85%; the specific figure changes slightly with each new version of the test that's published.

Is it easy to crack CCNA? ›

CCNA being a popular certification does not mean that it is easier to crack than other certifications! The credit for its popularity goes to the global recognition of the Cisco certifications and being an unmatched leader on top of all other networking certifications, be it CompTIA or Juniper Networks.

What is the difference between networking and communication? ›

What is Networking and Communication? Data communications refers to the transmission of this digital data between two or more computers and a computer network or data network is a telecommunications network that allows computers to exchange data.

What is the difference between network and computer network? ›

Explanation: The network is the process of transporting data or information from one device to another, while computer network is the interconnection of various computer s to share software,hardware, resources and data through a communication medium between them.

What type of network must a home user access? ›

35. What type of network must a home user access in order to do online shopping? Home users will go online shopping over the Internet because online vendors are accessed through the Internet. An intranet is basically a local area network for internal use only.

Can I pass CCNA without experience? ›

The primary qualifications for a no experience CCNA job are a bachelor's degree and some experience managing networks. Since this is an entry-level role, employers do not require you to have professional experience, but any experience you have can help you stand out from other applicants.

Can you retake CCNA if you fail? ›

Once passed, a candidate must wait a minimum of 180 days before taking the same exam with an identical exam number. Candidates may only take a beta exam once. Candidates who fail an exam must wait a period of five (5) calendar days, beginning the day after the failed attempt, to retake the exam.

How long to study for CCNA with no experience? ›

New IT professionals with no work experience will probably take more than 5 months to prepare for the CCNA 200-301, while network administrators with a few years of work experience can probably pass the 200-301 in less than 3 months.

How many hours should I study a day for CCNA? ›

CBT Nuggets coaches say you should be CCNA ready in about 26 weeks by studying 30 to 60 minutes per day.

How much do you get paid for CCNA only? ›

Ccna Salary. $66,500 is the 25th percentile. Salaries below this are outliers. $106,500 is the 75th percentile.

Is CCNA alone enough to get a job? ›

The CCNA certification is one of the best certifications to begin with. You can open the doorway to a number of job opportunities with the CCNA certification. The answer to the question if CCNA certification is enough to get a job is simple, yes, you can get a job.

Does CCNA expire? ›

How Long is the CCNA Certificate Valid? Your certification is valid for three years after your date of issue. To recertify before your certificate's expiration date, you must satisfy several recertification criteria. You don't have to do anything to keep your CCNA certification active.

Which is harder CCNA or Network+? ›

Why You Should Get CCNA. CCNA Routing and Switching is a Cisco-specific networking certification. While it is still considered a beginner-level certification, most professionals consider it to be significantly more challenging than the CompTIA Network+ exam.

Is CCNA harder than security? ›

The CompTIA Security+ certification is considered to be a beginner-level certification. It is designed for IT professionals who are new to cybersecurity or have limited experience. The exam is generally considered to be easier than the Cisco CCNA exam, and candidates require less preparation.

What is the passing rate for Cisco? ›

The passing percentage for the CCNA routing and switching exam is 85% as well as according to some resources the test has a failure rate for the first attempt is (+/- 95%). It realistically takes an inspired specific about 3 months or less of self-study/assessment to get ready for the CCNA.

What is the highest CCNA score? ›

The minimum passing score is around 800-850 out of a maximum score of 1000. Cisco also recommends having about 250 hours of hands-on experience before attempting the CCNA certification exam.

How many people have passed CCNA? ›

The passing percentage for the CCNA certification is 85% and according to some resources the exam has a failure rate for the first attempt is (+/- 95%).

Is CCNA worth it in 2023? ›

The Benefits of the CCNA Certification course in 2023

The network industry is growing. Software-defined networking and the cloud are two emerging technologies. These technologies are having a major impact on the networking industry, creating new job characteristics. CCNA certifications are perfect for new IT roles.

How to pass CCNA 2023? ›

10 Tips to Pass the CCNA Certification Exam in 2023
  1. Gather every possible information about the exam.
  2. Draw out your plan.
  3. Select a preparation method that works for you.
  4. Go for tutorial.
  5. Prepare for practical.
  6. Source for learning materials.
  7. Find your area of weakness.
  8. Practice mock test.
Dec 14, 2022

Should I self study for CCNA? ›

The first question that pops up in your mind is if you can pass Cisco CCNA with self-study. Passing the CISCO CCNA will always need hands-on knowledge and experience of computer networking concepts. But, if you want, the skills can be procured solely through self-study if you choose to go for it.

What are the 3 modules of CCNA? ›

CCNA Modules
  • CCNA 1 – Introduction to Networks.
  • CCNA 3: Enterprise Networking, Security and Automation.
  • CCNA 2: Switching, Routing, and Wireless Essentials.

What are the stages of CCNA? ›

Cisco offers certifications at four levels: entry, associate, professional and expert.

What do you learn in CCNA 1? ›

You'll Learn These Core Skills:

Build simple LANs, perform basic configurations for routers and switches, and implement IPv4 and IPv6 addressing schemes. Configure routers, switches, and end devices to provide access to local and remote network resources and to enable end-to-end connectivity between remote devices.

What is CCNA Module 2? ›

In this second course in a 3-course CCNA series you'll perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN. Recommended preparation: CCNA: Introduction to Networks or having equivalent knowledge.

Is IT hard to pass CCNA? ›

You may have heard that many people have failed the CCNA exam or claim the exam is tough because they failed. But the truth is that it doesn't matter how much IT experience you have or how familiar you are with tests, preparation is still necessary. If you have prepared for it, you can easily pass the exam.

Is 3 months enough for CCNA? ›

New IT professionals with no work experience will probably take more than 5 months to prepare for the CCNA 200-301, while network administrators with a few years of work experience can probably pass the 200-301 in less than 3 months.

How much do CCNA certified people make? ›

Ccna Salary
Annual SalaryMonthly Pay
Top Earners$129,500$10,791
75th Percentile$106,500$8,875
Average$89,681$7,473
25th Percentile$66,500$5,541

What is the fail rate for CCNA first time? ›

Most people who take the CCNA exam consider it to be incredibly difficult, and as many as 95% of test-takers fail it on their first attempt. Make no mistake that it's hard: Even people with relevant degrees and many who have taken CCNA certification classes still have to retake the test several times.

Is CCNA a beginner level? ›

The CCNA is an entry-level networking certification that can prepare you for networking roles in IT like network specialist, network administrator, and network engineer.

Is CCNA easier now? ›

In general, the new CCNA is shaping up to be harder than the old CCNA. The changes require that you have a wider knowledge base. Previously, you could ease your way into CCNA Routing & Switching by starting off with a CCENT (retired Feb 24, 2020) to get you into the CCNA Routing & Switching.

How much does a CCNA cost? ›

CCNA Certification Exam Costs – $325 to $600

CCNA Cloud, Collaboration, Cyber Ops, Data Center, and Service Provider each cost $600. These exams have two advanced technologies exams and no prerequisites. Each exam costs $300 per attempt.

Which CCNA course is best for beginners? ›

5 Best Cisco CCNA Online Training Courses for Beginners in 2023
  • Cisco CCNA 200–301 — The Complete Guide to Getting Certified. ...
  • The Complete Networking Fundamentals Course. ...
  • Introduction to Networking for Cisco CCNA [Pluralsight course] ...
  • CCNA Labs — 7 Days till your Cisco 200–125 and 200–105 Exam.

Is CCNA 1 worth IT? ›

You can gain a lifetime of experience with a CCNA certification. CCNA is the industry standard when it comes to the technical industry. You can further explore a number of job opportunities after CCNA. Also, the best part is that you can always upgrade to Cisco Certified Network Professional (CCNP) certification.

How many exams do you need for CCNA? ›

One must pass one or two certification exams to achieve a CCNA or CCDA credential, depending on the track you choose. The CCNA recognizes basic skills in installing, supporting, and troubleshooting wired and/or wireless networks.

Is CCNA paid? ›

The national average salary for a Network Engineer (Ccna) is ₹17,000 in India.

Is the CCNA multiple choice? ›

CCNA Question Types

Multiple Choice questions have only a single correct answer that you must select from multiple options.

References

Top Articles
Latest Posts
Article information

Author: The Hon. Margery Christiansen

Last Updated: 29/09/2023

Views: 5325

Rating: 5 / 5 (50 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: The Hon. Margery Christiansen

Birthday: 2000-07-07

Address: 5050 Breitenberg Knoll, New Robert, MI 45409

Phone: +2556892639372

Job: Investor Mining Engineer

Hobby: Sketching, Cosplaying, Glassblowing, Genealogy, Crocheting, Archery, Skateboarding

Introduction: My name is The Hon. Margery Christiansen, I am a bright, adorable, precious, inexpensive, gorgeous, comfortable, happy person who loves writing and wants to share my knowledge and understanding with you.