Paket-deal
CCNA|Cisco Certified Network Associate|Tests Bundle Set
CCNA|Cisco Certified Network Associate|Tests Bundle Set
[ Mehr anzeigen ]CCNA|Cisco Certified Network Associate|Tests Bundle Set
[ Mehr anzeigen ]What is the primary purpose of a VLAN? CORRECT ANSWER To create a broadcast domain; enable segmentation or isolation of broadcast traffic 
 
Unassigned Cisco switch ports remain in which VLAN? CORRECT ANSWER VLAN 1 
 
Do VLANs prevent broadcast storms? CORRECT ANSWER No, they minimize the size and e...
Vorschau 3 aus 22 Seiten
In den EinkaufswagenWhat is the primary purpose of a VLAN? CORRECT ANSWER To create a broadcast domain; enable segmentation or isolation of broadcast traffic 
 
Unassigned Cisco switch ports remain in which VLAN? CORRECT ANSWER VLAN 1 
 
Do VLANs prevent broadcast storms? CORRECT ANSWER No, they minimize the size and e...
What is the IEEE of Bluetooth? CORRECT ANWER 802.15 WPAN 
 
What is WiMAX and it IEEE? CORRECT ANWER -Worldwide Interoperability for Microwave Access 
-IEEE 802.16 WWAN 
 
In cellular broadband there are two types of cellular networks, what are they? CORRECT ANWER Global System for Mobile (GSM) and ...
Vorschau 4 aus 62 Seiten
In den EinkaufswagenWhat is the IEEE of Bluetooth? CORRECT ANWER 802.15 WPAN 
 
What is WiMAX and it IEEE? CORRECT ANWER -Worldwide Interoperability for Microwave Access 
-IEEE 802.16 WWAN 
 
In cellular broadband there are two types of cellular networks, what are they? CORRECT ANWER Global System for Mobile (GSM) and ...
True statements about the operation of a full-duplex Ethernet network CORRECT ANSWER There are no collisions in full-duplex mode. 
A dedicated switch port is required for each full-duplex node. 
The host network card and the switch port must be capable of operating in full-duplex mode. 
 
Which OSI ...
Vorschau 1 aus 4 Seiten
In den EinkaufswagenTrue statements about the operation of a full-duplex Ethernet network CORRECT ANSWER There are no collisions in full-duplex mode. 
A dedicated switch port is required for each full-duplex node. 
The host network card and the switch port must be capable of operating in full-duplex mode. 
 
Which OSI ...
Network Characteristics CORRECT ANSWER Topoplogy 
Speed 
Cost 
Security 
Availability 
Scalability 
Reliability 
 
OSI (Open System Interconnect) Model CORRECT ANSWER A conceptual model to data transmission at each individual layer. How networks talk to each other 
 
OSI layers CORRECT ANSWER Sende...
Vorschau 2 aus 15 Seiten
In den EinkaufswagenNetwork Characteristics CORRECT ANSWER Topoplogy 
Speed 
Cost 
Security 
Availability 
Scalability 
Reliability 
 
OSI (Open System Interconnect) Model CORRECT ANSWER A conceptual model to data transmission at each individual layer. How networks talk to each other 
 
OSI layers CORRECT ANSWER Sende...
Which communication tool allows real-time collaboration? 
 
a. wiki 
b. e-mail 
c. weblog 
d. instant messaging CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (...
Vorschau 4 aus 64 Seiten
In den EinkaufswagenWhich communication tool allows real-time collaboration? 
 
a. wiki 
b. e-mail 
c. weblog 
d. instant messaging CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (...
Which of the following are the address ranges of the private IP addresses? (Choose three.) CORRECT ANSWER 10.0.0.0 to 10.255.255.255 ; 
172.16.0.0 to 172.31.255.255; 
192.168.0.0 to 192.168.255.255 
 
Which two functions of the OSI model occur at layer two? (Choose two.) CORRECT ANSWER physical addr...
Vorschau 2 aus 12 Seiten
In den EinkaufswagenWhich of the following are the address ranges of the private IP addresses? (Choose three.) CORRECT ANSWER 10.0.0.0 to 10.255.255.255 ; 
172.16.0.0 to 172.31.255.255; 
192.168.0.0 to 192.168.255.255 
 
Which two functions of the OSI model occur at layer two? (Choose two.) CORRECT ANSWER physical addr...
Hosts CORRECT ANSWER All computers that are connected to a network and participate directly in network communication are classified as 
 
End Devices & Clients CORRECT ANSWER Hosts can be called 
 
Hosts CORRECT ANSWER devices on the network that are assigned a number for communication purposes 
 
I...
Vorschau 2 aus 10 Seiten
In den EinkaufswagenHosts CORRECT ANSWER All computers that are connected to a network and participate directly in network communication are classified as 
 
End Devices & Clients CORRECT ANSWER Hosts can be called 
 
Hosts CORRECT ANSWER devices on the network that are assigned a number for communication purposes 
 
I...
What is a network? CORRECT ANSWER A network is all of the components involved in connecting computers and applications across small and large distances to increase productivity and give easy access to information. 
 
What resources are commonly shared across a network? CORRECT ANSWER Data and applic...
Vorschau 2 aus 14 Seiten
In den EinkaufswagenWhat is a network? CORRECT ANSWER A network is all of the components involved in connecting computers and applications across small and large distances to increase productivity and give easy access to information. 
 
What resources are commonly shared across a network? CORRECT ANSWER Data and applic...
What are the steps to configure a static route CORRECT ANSWER Configure unidirectional static routes to and from a stub network 
Define a path to the IP destination network 
 
Question: Which of the following commands will display information about the specific port channel interface? CORRECT ANSWER...
Vorschau 1 aus 3 Seiten
In den EinkaufswagenWhat are the steps to configure a static route CORRECT ANSWER Configure unidirectional static routes to and from a stub network 
Define a path to the IP destination network 
 
Question: Which of the following commands will display information about the specific port channel interface? CORRECT ANSWER...
The network administrator enters these commands into the R1 router: 
R1# copy running-config tftp 
Address or name of remote host [ ]? 
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt? CORRECT ANSWER 192.168.11.252 
 
Which thr...
Vorschau 2 aus 12 Seiten
In den EinkaufswagenThe network administrator enters these commands into the R1 router: 
R1# copy running-config tftp 
Address or name of remote host [ ]? 
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt? CORRECT ANSWER 192.168.11.252 
 
Which thr...
CCNA Practice Exam questions with correct answers
Vorschau 2 aus 10 Seiten
In den EinkaufswagenCCNA Practice Exam questions with correct answers
CCNA 1:Module 1 questions with correct answers
Vorschau 2 aus 10 Seiten
In den EinkaufswagenCCNA 1:Module 1 questions with correct answers
What is one advantage of using the cut-through switching method instead of the store-and-forward switching method? - Correct Answer-Has a lower latency appropriate for high-performance computing applications. 
 
A _______ network is one that uses the same infrastructure to carry voice, data, and vid...
Vorschau 1 aus 4 Seiten
In den EinkaufswagenWhat is one advantage of using the cut-through switching method instead of the store-and-forward switching method? - Correct Answer-Has a lower latency appropriate for high-performance computing applications. 
 
A _______ network is one that uses the same infrastructure to carry voice, data, and vid...
What is a characteristic of a fault tolerant network? CORRECT ANSWER a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure* 
 
Three bank employees are using the corporate network. The first employee uses a web browser to view a company web ...
Vorschau 3 aus 18 Seiten
In den EinkaufswagenWhat is a characteristic of a fault tolerant network? CORRECT ANSWER a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure* 
 
Three bank employees are using the corporate network. The first employee uses a web browser to view a company web ...
Vorschau 3 aus 25 Seiten
In den EinkaufswagenCCNA 200-301 questions with correct answers
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? 
DoS attack 
identity theft 
spyware 
zero-day attack CORRECT A...
Vorschau 3 aus 19 Seiten
In den EinkaufswagenDuring a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? 
DoS attack 
identity theft 
spyware 
zero-day attack CORRECT A...
AAA CORRECT ANSWER Authentication, authorization and accounting 
 
AAA Server CORRECT ANSWER Server providing authentication, authorization and accounting services 
 
Access Control Entry (ACE) CORRECT ANSWER One line in an access control list (ACL) 
 
access interface CORRECT ANSWER A LAN network d...
Vorschau 4 aus 54 Seiten
In den EinkaufswagenAAA CORRECT ANSWER Authentication, authorization and accounting 
 
AAA Server CORRECT ANSWER Server providing authentication, authorization and accounting services 
 
Access Control Entry (ACE) CORRECT ANSWER One line in an access control list (ACL) 
 
access interface CORRECT ANSWER A LAN network d...
Which communication tool allows real-time collaboration? CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) CORRECT ANSWER regenerating data signals 
 ...
Vorschau 2 aus 10 Seiten
In den EinkaufswagenWhich communication tool allows real-time collaboration? CORRECT ANSWER instant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) CORRECT ANSWER regenerating data signals 
 ...
Which of the following addresses will a switch use to populate the CAM table? 
 
Destination MAC address 
Source IP address 
Destination IP Address 
Source MAC address CORRECT ANSWER Source MAC address 
 
What is another name for hypervisor? CORRECT ANSWER VMM (Virtual Machine Monitor) 
 
Which tabl...
Vorschau 4 aus 56 Seiten
In den EinkaufswagenWhich of the following addresses will a switch use to populate the CAM table? 
 
Destination MAC address 
Source IP address 
Destination IP Address 
Source MAC address CORRECT ANSWER Source MAC address 
 
What is another name for hypervisor? CORRECT ANSWER VMM (Virtual Machine Monitor) 
 
Which tabl...
Ensuring that several individuals are able to perform a specific function in order to have oversight and eliminate single points of failure, is which of the following Operations Security principles? CORRECT ANSWER C. Rotation of duties 
 
A standard ACL: CORRECT ANSWER C. Identifies the source netwo...
Vorschau 1 aus 4 Seiten
In den EinkaufswagenEnsuring that several individuals are able to perform a specific function in order to have oversight and eliminate single points of failure, is which of the following Operations Security principles? CORRECT ANSWER C. Rotation of duties 
 
A standard ACL: CORRECT ANSWER C. Identifies the source netwo...
What types of network devices and connections are typically found in a small network? CORRECT ANSWER In a small network, there are typically a couple of end devices like laptops and printers along with a router or switch and a server. 
 
Why is it important to study small networks? CORRECT ANSWER It...
Vorschau 2 aus 11 Seiten
In den EinkaufswagenWhat types of network devices and connections are typically found in a small network? CORRECT ANSWER In a small network, there are typically a couple of end devices like laptops and printers along with a router or switch and a server. 
 
Why is it important to study small networks? CORRECT ANSWER It...
Stuvia Verkäufer haben mehr als 700.000 Zusammenfassungen beurteilt. Deshalb weißt du dass du das beste Dokument kaufst.
Man bezahlt schnell und einfach mit iDeal, Kreditkarte oder Stuvia-Kredit für die Zusammenfassungen. Man braucht keine Mitgliedschaft.
Deine Mitstudenten schreiben die Zusammenfassungen. Deshalb enthalten die Zusammenfassungen immer aktuelle, zuverlässige und up-to-date Informationen. Damit kommst du schnell zum Kern der Sache.
Du erhältst eine PDF-Datei, die sofort nach dem Kauf verfügbar ist. Das gekaufte Dokument ist jederzeit, überall und unbegrenzt über dein Profil zugänglich.
Unsere Zufriedenheitsgarantie sorgt dafür, dass du immer eine Lernunterlage findest, die zu dir passt. Du füllst ein Formular aus und unser Kundendienstteam kümmert sich um den Rest.
Stuvia ist ein Marktplatz, du kaufst dieses Dokument also nicht von uns, sondern vom Verkäufer cracker. Stuvia erleichtert die Zahlung an den Verkäufer.
Nein, du kaufst diese Zusammenfassung nur für $40.99. Du bist nach deinem Kauf an nichts gebunden.
4.6 Sterne auf Google & Trustpilot (+1000 reviews)
45.681 Zusammenfassungen wurden in den letzten 30 Tagen verkauft
Gegründet 2010, seit 14 Jahren die erste Adresse für Zusammenfassungen