CCNA Chapter 1
Converged
A _________ network is designed to deliver multiple communication types, such as data, video and voice services, using the same network infrastructure.
converged
A ______________________network is capable of delivering voice, video, text, and graphics over the same communication channels.
easy to create lacks centralized administration less cost to implement
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network?
data confidentiality
A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?
encapsulation
Applications on end devices generate data, alter data content, and are responsible for initiating the _______ process.
Internet
It provides connections through interconnected global networks
A, B, D, G*
Refer to the exhibit. Which set of devices contains only intermediary devices? A, B, D, G A, B, E, F C, D, G, I G, H, I, J
confidentiality
Requiring strong, complex passwords is a practice that supports which network security goal?
QoS.
The network provides predictable levels of service to different types of traffic supports this
intermediary devices
They direct data along alternate pathways when there is a link failure They filter the flow of data, based on security settings
end devices
They originate the data that flows through the network and are the interface between humans and the communication network
the distance the selected medium can successfully carry a signal the environment where the selected medium is to be installed Criteria for choosing a network medium are the distance the selected medium can successfully carry a signal, the environment in which the selected medium is to be installed, the amount of data and the speed at which the data must be transmitted, and the cost of the medium and its installation.
What two criteria are used to help select a network medium from various network media? (Choose two.) the types of data that need to be prioritized the cost of the end devices utilized in the network the distance the selected medium can successfully carry a signal* the number of intermediary devices installed in the network the environment where the selected medium is to be installed*
the distance the media can successfully carry a signal the environment where the media is to be installed
What two criteria are used to help select network media?
video conferencing
What type of network traffic requires QoS?
Congestion
Which expression accurately defines a state where the demand on the network resources exceeds the available capacity
Congestion
Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
TelePresence
Which tool provides real-time video and audio communication over the Internet so that businesses can conduct corporate meetings with participants from several remote places
Cellular Satellite
Which two Internet connection options do not require that physical cables be run to the building?
DSL Cable
Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN?
DSL cable
Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a LAN
Intermediary
_________ devices direct the path of the data and connect individual hosts to the network
Bandwidth
a measure of the data carrying capacity of the media
converged
a single network channel capable of delivering multiple communication forms
Intranet
a term used to refer to a private connection of LANs and WANs that belongs to an organization. is designed to be accessible only by the organization's members, employees, or others with authorization.
Powerline networking
adds the ability to connect a device to the network using an adapter wherever there is an electrical outlet. The network uses existing electrical wiring to send data. It is not a replacement for physical cabling, but it can add functionality in places where wireless access points cannot be used or cannot reach devices.
Cloud computing
allows users to access applications, back up and store files, and perform tasks without needing additional software or servers. users access resources through subscription-based or pay-per-use services, in real time, using nothing more than a web browser.
LANs
are typically operated by single organizations or individuals.
WANs
are typically operated through multiple ISPs
Integrity
assurance that information not altered
Router
is used to determine the path that the messages should take through the network.
Confidentiality
only intended recipients can access
availability
timely and reliable access to data