ITN | Modules 1 – 3

Match the description to the organization. (Not all options are used.)

Correct! Wrong!

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

Correct! Wrong!

What is done to an IP packet before it is transmitted over the physical medium?

Correct! Wrong!

What term describes a computing model where server software runs on dedicated computers?

Correct! Wrong!

What are two functions of end devices on a network? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?

Correct! Wrong!

What term describes the ability to use personal devices across a business or campus network?

Correct! Wrong!

A technician configures a switch with these commands:

SwitchA(config)# interface vlan 1
SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown

What is the technician configuring?

Correct! Wrong!

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

Correct! Wrong!

At which OSI layer is a source MAC address added to a PDU during the encapsulation process?

Correct! Wrong!

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

Please select 3 correct answers

Correct! Wrong!

Which name is assigned to the transport layer PDU?

Correct! Wrong!

In computer communication, what is the purpose of message encoding?

Correct! Wrong!

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?

Correct! Wrong!

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What is the IP address of the switch virtual interface (SVI) on Switch0?

Correct! Wrong!

What layer is responsible for routing messages through an internetwork in the TCP/IP model?

Correct! Wrong!

Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

Please select 3 correct answers

Correct! Wrong!

What term describes a network where one computer can be both client and server?

Correct! Wrong!

At which OSI layer is a destination MAC address added to a PDU during the encapsulation process?

Correct! Wrong!

At which OSI layer is a source port number added to a PDU during the encapsulation process?

Correct! Wrong!

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

Correct! Wrong!

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

Please select 3 correct answers

Correct! Wrong!

Which two protocols function at the internet layer? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

What term describes storing personal files on servers over the internet to provide access anywhere, anytime, and on any device?

Correct! Wrong!

Which statement is correct about network protocols?

Correct! Wrong!

What is the Internet?

Correct! Wrong!

Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

Correct! Wrong!

What is the general term that is used to describe a piece of data at any layer of a networking model?

Correct! Wrong!

Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?

Correct! Wrong!

An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.)

Correct! Wrong!

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

Correct! Wrong!

Which memory location on a Cisco router or switch stores the startup configuration file?

Correct! Wrong!

What type of communication will send a message to all devices on a local area network?

Correct! Wrong!

How is SSH different from Telnet?

Correct! Wrong!

Which three acronyms/initialisms represent standards organizations? (Choose three.)

Please select 3 correct answers

Correct! Wrong!

Which statement is true about the running configuration file in a Cisco IOS device?

Correct! Wrong!

Which message delivery option is used when all devices need to receive the same message simultaneously?

Correct! Wrong!

Which two statements are true regarding the user EXEC mode? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

What term describes a technology that allows devices to connect to the LAN using an electrical outlet?

Correct! Wrong!

What process is used to receive transmitted data and convert it into a readable message?

Correct! Wrong!

Which PDU format is used when bits are received from the network medium by the NIC of a host?

Correct! Wrong!

What term describes a private collection of LANs and WANs that belongs to an organization?

Correct! Wrong!

What type of network must a home user access in order to do online shopping?

Correct! Wrong!

What is an advantage of network devices using open standard protocols?

Correct! Wrong!

What term describes a type of network used by people who work from home or from a small remote office?

Correct! Wrong!

What is a characteristic of multicast messages?

Correct! Wrong!

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

Correct! Wrong!

What are three characteristics of an SVI? (Choose three.)

Please select 3 correct answers

Correct! Wrong!

Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond?

Correct! Wrong!

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

Correct! Wrong!

Match the definitions to their respective CLI hot keys and shortcuts. (Not all options are used.)

Correct! Wrong!

In which scenario would the use of a WISP be recommended?

Correct! Wrong!

Refer to the exhibit. ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

Correct! Wrong!

Which memory location on a Cisco router or switch will lose all content when the device is restarted?

Correct! Wrong!

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

Correct! Wrong!

What is the purpose of protocols in data communications?

Correct! Wrong!

Which statement describes the use of powerline networking technology?

Correct! Wrong!

At which OSI layer is a destination IP a

Correct! Wrong!

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

Which interface allows remote management of a Layer 2 switch?

Correct! Wrong!

10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?

Correct! Wrong!

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

Correct! Wrong!

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

Correct! Wrong!

To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?

Correct! Wrong!

What process involves placing one PDU inside of another PDU?

Correct! Wrong!

In the show running-config command, which part of the syntax is represented by running-config ?

Correct! Wrong!

Which command or key combination allows a user to return to the previous level in the command hierarchy?

Correct! Wrong!

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?

Correct! Wrong!

For the TCP/IP protocol suite, what is the correct order of events when a Telnet message is being prepared to be sent over the network?

Correct! Wrong!

Why would a technician enter the command copy startup-config running-config?

Correct! Wrong!

Which device performs the function of determining the path that messages should take through internetworks?

Correct! Wrong!

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

Correct! Wrong!

What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address?

Correct! Wrong!

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

At which layer of the OSI model would a logical address be added during encapsulation?

Correct! Wrong!

How does BYOD change the way in which businesses implement networks?​

Correct! Wrong!

What is an ISP?

Correct! Wrong!

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

Correct! Wrong!

What process is used to place one message inside another message for transfer from the source to the destination?

Correct! Wrong!

What is the function of the shell in an OS?

Correct! Wrong!

What two criteria are used to help select a network medium from various network media? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?

Correct! Wrong!

Which functionality is provided by DHCP?

Correct! Wrong!

A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?

Please select 2 correct answers

Correct! Wrong!

What are two benefits of using a layered network model? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

Which type of access is secured on a Cisco router or switch with the enable secret command?

Correct! Wrong!

Which logical address is used for delivery of data to a remote network?

Correct! Wrong!

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

Correct! Wrong!

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

Correct! Wrong!

What is the default SVI on a Cisco switch?

Correct! Wrong!

What function does pressing the Tab key have when entering a command in IOS?

Correct! Wrong!

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

Correct! Wrong!

What are two characteristics of RAM on a Cisco device? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

Match the requirements of a reliable network with the supporting network architecture. (Not all options are used.)

Correct! Wrong!

Which type of communication will send a message to a group of host destinations simultaneously?

Correct! Wrong!

At which OSI layer is a destination port number added to a PDU during the encapsulation process?

Correct! Wrong!

What are two characteristics of a scalable network? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

Correct! Wrong!

At which OSI layer is data added to a PDU

Correct! Wrong!

What type of network traffic requires QoS?

Correct! Wrong!

At which OSI layer is a source IP address added to a PDU during the encapsulation process?

Correct! Wrong!

Why would a Layer 2 switch need an IP address?

Correct! Wrong!

ITN | Modules 1 - 3
Final Score

Congratulations, you have completed the CCNA1 v7 – ITN – Modules 1 – 3! Tell us your rating!

Share your Results: