CCNA 1 Chapter 1
What network traffic processes must be in place for QoS strategies to work correctly? (CHOOSE TWO) a. Traffic is classified based on QoS requirements. b. Priorities are assigned to each classification of application data. c. Web traffic is always assigned to a high priority queue for processing. d. Digital movies are always assigned to the high priority queue for processing. e. E-mail traffic is always assigned to the low-priority queue.
A, B - QoS strategy first classifies traffic based on requirements and then assigns priorities to the classifications as needed by the owners of the network. The network admin can assign priorities to different values (email, movies, etc)
For which three reasons was a packet-switched, connectionless data communications technology used when developing the Internet? (CHOOSE THREE) a. It can rapidly adapt to the loss of data transmission facilities. b. It efficiently utilized the network infrastructure to transfer data. c. Data packets can travel multiple paths through the network simultaneously. d. It allows billing of network use by the amount of time a connection is established. e. It requires that a data circuit between the source and destination be established before data can be transferred.
A, B, C
Which type of network provides customers with limited access to corporate data such as inventory, parts lists, and orders? a. Intranet b. Extranet c. Internetwork d. Internet
B - An extranet provides as-needed access for external vendors and customers to a secure corporate network. An intranet is for internal users.
Which term describes a common platform for diverse communication types? a. Scalability b. Convergence c. Fault tolerance d. Quality of service (QoS)
B - Convergence is combining different technologies on one network platform.
What is the role of QoS in a converged network? a. Ensures that all traffic above available bandwidth levels is dropped. b. Establishes delivery priorities for different types of communication in a network c. Determines precise priorities for all types of network communication d. Allows unused bandwidth to be shared by other organizations within the network
B - QoS establishes priorities but is not required to rate all network communications. It simply gives priority to what is deemed important.
Which of the following pertains to network infrastructure security? a. A competitor accesses sensitive information through an unsecured wireless network b. Builders accidentally cut a network cable while digging c. A disgruntled employee alters information in a customer database d. A secretary sends confidential info in a reply to an e-mail that falsely appears to come from her boss
B - The cut cable refers to infrastructure security. All others are content security.
For which 3 reasons were circuit-switched, connection-oriented technologies rejected when the Internet was being developed? a. Circuit-switched technologies required that a single message be broken up into multiple messages blocks that contain addressing information. b. Early circuit-switched networks didn't automatically establish alternative circuits in the event of circuit failure. c. Circuit-switched technologies required that an open circuit between network endpoints be established even if data was not being actively transferred between locations. d. The quality and consistency of messages transmitted across a connection-oriented, circuit-switched network cannot be guaranteed. e. The establishment of simultaneous open circuits for fault tolerance is costly.
B, C, E
A worker is assigned to work on a project with another employee from a different city. During online meetings, there are periods of sketchy video and garbled voice communications. Which combination of the following conditions could cause this? a. Poor scalability in network design b. Poor security; allowing someone to download music and video files at work c. Lack of redundant links to the firewall d. Poor QoS
B, D - It is possible that music and video downloads could take too much bandwidth and processing, disrupting the conference. Better QoS would give the video sessions priority over the download and avoid disruption.
What are two components of network architecture? a. People that comprise the human network b. Built-in growth potential c. Data transfer across the network d. Redundant technologies e. Corporations that operate and maintain the data network
B,D - Two components of a network's architecture are scalability, which is planning for growth, and fault tolerance, which includes redundant links.
What prioritizes traffic and its characteristics to manage data? a. Network Administration b. Network Traffic c. QoS strategy d. Network evaluation
C - Considering the importance of traffic flow when managing data is a function of a QoS strategy. Network admins would evaluate the network traffic to determine QoS strategy.
Which form of communication is a real-time, text based communication type used between two or more people who use mostly text to communicate? a. Weblogs b. Wikis c. Instant Messaging d. Podcasting
C - Instant messaging is the only answer that is both text-based and real time.
Which pair of terms describes a network communications in which a bank has 24-hour exclusive access to an ATM? a. Connectionless and packet-switched b. Packet-switched and connection-oriented c. Circuit-switched and connection-oriented d. Circuit-switched and connectionless
C - The connection is established and exclusive, so it is privately circuit switched, which are connection oriented.
What are collaborative web pages created and edited by users?
Wikis
What are symbols that graphically represent network devices and media called?
icons
Copper cables and fiber-optic cables are two types of network __________________.
media
Connectionless messages are broken into __________.
packets
What are rules that govern the process of network communication called?
protocols
What is a device that helps direct messages between networks called?
router