Cisco Quiz Questions
True or False: A protocol suite is a set of protocols that work together to provide comprehensive network communication services. (Refer to Module 1: Introduction to Networks, topic 3.2.2) a) True b) False
a
Which logical address is responsible for delivering the IP packet from the original source to the final destination, either on the same network or to a remote network. (Refer to Module 1: Introduction to Networks, topic 3.3.2) a) Source and Destination IP address b) Source and Destination Data link c) Source Destination MAC address d) Source IP address ONLY
a
Specific features of LANs include which of the following? (choose all that apply) (Refer to Module 1: Introduction to Networks, topic 1.2.2) a) A LAN is usually administered by a single organization or individual. b) LANs provide high speed bandwidth to internal end-devices and intermediary devices. c) LANs are usually administered by multiple service providers. d) LANs interconnect end devices in a limited area such as a home, school, office building, or campus.
a b c
Which of the following are the four basic characteristics that the underlying network architecture needs to address in order to meet user expectations. (choose all that apply) (Refer to Module 1: Introduction to Networks, topic 1.3.2) a) Security b) Quality of Service (QoS) c) Fault Tolerance d) Scalability e) DNA
a b c d
Which of following would be considered an end device? (choose all that apply) a) Desktop Computer b) Firewall c) Printer d) Laptop
a c d
The functional description of the Transport layer in the OSI model provides ________. (Refer to Module 2 :Introduction to Networks, topic 3.2.4) a) Exchanges frames between devices. b) segments, transfers, and reassembles data. c) bit transmission. d) provides a data path or route. e) protocols used for process to process communication.
b
The running-config file is stored in______________________. (Refer to Module 1: Introduction to Networks, topic 2.2.3) a) Flash drive b) RAM c) SD drive d) NVRAM e) USB drive
b
To execute configuration commands, a network administrator must access ____________ EXEC mode. (Refer to Module 1: Introduction to Networks, topic 2.1.3) a) User Exec b) Privileged User c) Privileged Exec d) Administrator Exec
c
_______ is the process of converting information into another acceptable form, for transmission. _______ reverses this process in order to interpret the information. (Refer to Module 1: Introduction to Networks, topic 3.1.1) a) Labeling, Unlabeling b) Coding, Uncoding c) Encoding, Decoding d) Tagging, Tag Popping
c
To access context-sensitive help, simply enter a ___________ at the CLI. (Refer to Module 1: Introduction to Networks, topic 2.1.4) a) forward slash, / b) asterisk, * c) exclamation mark, ! d) question mark, ?
d