SlideShare a Scribd company logo
Cisco 1 - Networking Basics                                   Chapter 2




    LANs were developed to solve which business needs? (Choose three.)

             1.   reduce duplication of equipment
             2.   promote the use of sneakernets
             3.   increase productivity while saving money
             4.   reduce the number of duplicate copies of files
             5.   connect users in different geographic locations
             6.   increase complexity of the work environment




Perrine. J                                  07/15/09                      Page 1
Cisco 1 - Networking Basics                                  Chapter 2




    LANs were developed to solve which business needs? (Choose three.)

             •   reduce duplication of equipment
             •   promote the use of sneakernets
             •   increase productivity while saving money
             •   reduce the number of duplicate copies of files
             •   connect users in different geographic locations
             •   increase complexity of the work environment




Perrine. J                                 07/15/09                      Page 2
Cisco 1 - Networking Basics                                     Chapter 2



   Which of the following were disadvantages of electronic bulletin boards?
   (Choose 3.)

             1.   Simultaneous user connections to multiple computers were very fast.
             2.   Availability was limited to those who knew the location.
             3.   They did not scale well to keep up with growing demand.
             4.   Users could not simultaneously share files.
             5.   Modem and telephone line requirements were demanding.




Perrine. J                                   07/15/09                          Page 3
Cisco 1 - Networking Basics                                    Chapter 2



   Which of the following were disadvantages of electronic bulletin boards?
   (Choose 3.)

             •   Simultaneous user connections to multiple computers were very fast.
             •   Availability was limited to those who knew the location.
             •   They did not scale well to keep up with growing demand.
             •   Users could not simultaneously share files.
             •   Modem and telephone line requirements were demanding.




Perrine. J                                 07/15/09                           Page 4
Cisco 1 - Networking Basics                                    Chapter 2



      Which of the following are LAN design goals? (Choose three)

             1.   provide full-time connectivity to remote services
             2.   consolidate network devices and protocols to a single vendor
             3.   provide access to high-bandwidth media
             4.   operate within a limited geographic area
             5.   allow users to share files and printers
             6.   provide access to geographically separated networks




Perrine. J                                  07/15/09                             Page 5
Cisco 1 - Networking Basics                                   Chapter 2



      Which of the following are LAN design goals? (Choose three)

             •   provide full-time connectivity to remote services
             •   consolidate network devices and protocols to a single vendor
             •   provide access to high-bandwidth media
             •   operate within a limited geographic area
             •   allow users to share files and printers
             •   provide access to geographically separated networks




Perrine. J                                 07/15/09                             Page 6
Cisco 1 - Networking Basics                             Chapter 2




      Which of the following are considered WAN technologies? (Choose three)

             1.   DSL
             2.   Ethernet
             3.   FDDI
             4.   Frame Relay
             5.   Modem
             6.   Token Ring




Perrine. J                             07/15/09                          Page 7
Cisco 1 - Networking Basics                             Chapter 2




      Which of the following are considered WAN technologies? (Choose three)

             •   DSL
             •   Ethernet
             •   FDDI
             •   Frame Relay
             •   Modem
             •   Token Ring




Perrine. J                             07/15/09                          Page 8
Cisco 1 - Networking Basics                                  Chapter 2



    Why are networking standards needed?


             1.   Many networks now cover wide geographic area
             2.   Technologies must be compatible to allow communication
             3.   Hardware and software are continually being redesigned
             4.   LANs, MANs, and WANs use different kinds of equipment.




Perrine. J                                  07/15/09                       Page 9
Cisco 1 - Networking Basics                                 Chapter 2



    Why are networking standards needed?


             •   Many networks now cover wide geographic area
             •   Technologies must be compatible to allow communication
             •   Hardware and software are continually being redesigned
             •   LANs, MANs, and WANs use different kinds of equipment.




Perrine. J                                 07/15/09                       Page 10
Cisco 1 - Networking Basics                                Chapter 2




     Why did networks experience problems in the mid-1980s?


             1.   Many new network technologies were incompatible
             2.   Employees preferred sneaker net
             3.   Common carriers went bankrupt
             4.   Everyone used the same hardware and software




Perrine. J                                07/15/09                     Page 11
Cisco 1 - Networking Basics                              Chapter 2




     Why did networks experience problems in the mid-1980s?


             •   Many new network technologies were incompatible
             •   Employees preferred sneaker net
             •   Common carriers went bankrupt
             •   Everyone used the same hardware and software




Perrine. J                               07/15/09                    Page 12
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following are typical features that determine throughput? (Choose
     two.)

             1.   types of passwords used on servers
             2.   type of Layer 3 protocol used
             3.   network topology
             4.   length of the network cable
             5.   number of users on the network




Perrine. J                                  07/15/09                        Page 13
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following are typical features that determine throughput? (Choose
     two.)

             •   types of passwords used on servers
             •   type of Layer 3 protocol used
             •   network topology
             •   length of the network cable
             •   number of users on the network




Perrine. J                                 07/15/09                         Page 14
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following would be used by a network administrator to calculate
     an estimate of network performance? (Choose two.)

             1.   size of file
             2.   protocol overhead
             3.   line bandwidth
             4.   encapsulation rate
             5.   bit error rate




Perrine. J                              07/15/09                            Page 15
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following would be used by a network administrator to calculate
     an estimate of network performance? (Choose two.)

             •   size of file
             •   protocol overhead
             •   line bandwidth
             •   encapsulation rate
             •   bit error rate




Perrine. J                              07/15/09                            Page 16
Cisco 1 - Networking Basics                                  Chapter 2




      What is the OSI model?


             1.   A conceptual framework that specifies how information travels through
                  networks
             2.   A model that describes how data makes its way from one application
                  program to another through a network
             3.   A conceptual framework that specifies which network functions occur at
                  each layer
             4.   All of the above




Perrine. J                                 07/15/09                            Page 17
Cisco 1 - Networking Basics                                 Chapter 2




      What is the OSI model?


             •   A conceptual framework that specifies how information travels through
                 networks
             •   A model that describes how data makes its way from one application
                 program to another through a network
             •   A conceptual framework that specifies which network functions occur at
                 each layer
             •   All of the above




Perrine. J                                07/15/09                            Page 18
Cisco 1 - Networking Basics                                    Chapter 2




      Which statements describe the network layer of the OSI model in relation to
          peer-to-peer communication? (Choose two.)

             1.   Data is encapsulated and a header is attached creating a packet.
             2.   Network layer information is encapsulated in a frame.
             3.   The header contains information required to complete the transfer,
                  such as source and destination logical addresses.
             4.   A service is provided to the physical and the application layer of the
                  OSI model.
             5.   Data is encapsulated into segments.
             6.   The header contains no error correction.




Perrine. J                                  07/15/09                              Page 19
Cisco 1 - Networking Basics                                   Chapter 2




      Which statements describe the network layer of the OSI model in relation to
          peer-to-peer communication? (Choose two.)

             •   Data is encapsulated and a header is attached creating a packet.
             •   Network layer information is encapsulated in a frame.
             •   The header contains information required to complete the
                 transfer, such as source and destination logical addresses.
             •   A service is provided to the physical and the application layer of the
                 OSI model.
             •   Data is encapsulated into segments.
             •   The header contains no error correction.




Perrine. J                                 07/15/09                              Page 20
Cisco 1 - Networking Basics                                 Chapter 2




        Which of the following are data link layer encapsulation details? (Choose two.)

             1.   Packets are put into frames.
             2.   Data is packaged into a packet.
             3.   Data is segmented into segments.
             4.   Data is converted for Internet travel.
             5.   An address is added to identify the directly connected device.




Perrine. J                                 07/15/09                            Page 21
Cisco 1 - Networking Basics                                Chapter 2




        Which of the following are data link layer encapsulation details? (Choose two.)

             •   Packets are put into frames.
             •   Data is packaged into a packet.
             •   Data is segmented into segments.
             •   Data is converted for Internet travel.
             •   An address is added to identify the directly connected device.




Perrine. J                                07/15/09                            Page 22
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following terms refers to end-user devices that provide users with a
     connection to the network?

              1.   hub
              2.   router
              3.   host
              4.   server




Perrine. J                              07/15/09                             Page 23
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following terms refers to end-user devices that provide users with a
     connection to the network?

              •   hub
              •   router
              •   host
              •   server




Perrine. J                              07/15/09                             Page 24
Cisco 1 - Networking Basics                                    Chapter 2



     Which of the following best defines encapsulation?


             1.   Segmenting data so that it flows uninterrupted through the network
             2.   Compressing data so that it moves more quickly
             3.   Moving data in groups so that it stays together
             4.   Wrapping of data in a particular protocol header




Perrine. J                                  07/15/09                            Page 25
Cisco 1 - Networking Basics                                   Chapter 2



     Which of the following best defines encapsulation?


             •   Segmenting data so that it flows uninterrupted through the network
             •   Compressing data so that it moves more quickly
             •   Moving data in groups so that it stays together
             •   Wrapping of data in a particular protocol header




Perrine. J                                 07/15/09                            Page 26
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following physical topologies is used in situations where breaks in
     communications are unacceptable?

               1.   ring
               2.   star
               3.   mesh
               4.   bus




Perrine. J                               07/15/09                             Page 27
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following physical topologies is used in situations where breaks in
     communications are unacceptable?

               •    ring
               •    star
               •    mesh
               •    bus




Perrine. J                               07/15/09                             Page 28
Cisco 1 - Networking Basics                              Chapter 2




       Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable
       technologies to securely connect mobile users and telecommuters to branch
       office networks?

             1.   Access VPN
             2.   Intranet VPN
             3.   Extranet VPN
             4.   Shared VPN




Perrine. J                             07/15/09                           Page 29
Cisco 1 - Networking Basics                              Chapter 2




       Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable
       technologies to securely connect mobile users and telecommuters to branch
       office networks?

             •   Access VPN
             •   Intranet VPN
             •   Extranet VPN
             •   Shared VPN




Perrine. J                             07/15/09                           Page 30
Cisco 1 - Networking Basics                               Chapter 2




     A contracting company is planning to allow its subcontractors and suppliers
     access to its network resources. It desires the security of knowing that the
     general public and competitors will not be able to access the information. Which
     of the following technologies should the company implement?

             1.   Access VPN
             2.   Dial-up VPN
             3.   Extranet VPN
             4.   Intranet VPN
             5.   Secure VPN
             6.   Wide-Area VPN




Perrine. J                              07/15/09                             Page 31
Cisco 1 - Networking Basics                               Chapter 2




     A contracting company is planning to allow its subcontractors and suppliers
     access to its network resources. It desires the security of knowing that the
     general public and competitors will not be able to access the information. Which
     of the following technologies should the company implement?

             •   Access VPN
             •   Dial-up VPN
             •   Extranet VPN
             •   Intranet VPN
             •   Secure VPN
             •   Wide-Area VPN




Perrine. J                              07/15/09                             Page 32
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following are characteristics that cause bandwidth to vary? (Choose
     three.)

             1.   network technologies used
             2.   physics of the media
             3.   application in use
             4.   signaling methods
             5.   type of data




Perrine. J                                07/15/09                          Page 33
Cisco 1 - Networking Basics                               Chapter 2




     Which of the following are characteristics that cause bandwidth to vary? (Choose
     three.)

             •   network technologies used
             •   physics of the media
             •   application in use
             •   signaling methods
             •   type of data




Perrine. J                              07/15/09                            Page 34
Cisco 1 - Networking Basics                             Chapter 2




       Which layer of the OSI model establishes, manages, and terminates
           communication between applications?


             1.   Application
             2.   Presentation
             3.   Session
             4.   Transport




Perrine. J                             07/15/09                            Page 35
Cisco 1 - Networking Basics                             Chapter 2




       Which layer of the OSI model establishes, manages, and terminates
           communication between applications?


             •   Application
             •   Presentation
             •   Session
             •   Transport




Perrine. J                             07/15/09                            Page 36
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following is the approximate amount of time it would take to transmit
     a 23.1 megabyte file on a T1 link?

             1.   fifteen seconds
             2.   fifteen million seconds
             3.   one hundred twenty seconds
             4.   one hundred twenty thousand seconds




Perrine. J                                  07/15/09                         Page 37
Cisco 1 - Networking Basics                                Chapter 2




     Which of the following is the approximate amount of time it would take to transmit
     a 23.1 megabyte file on a T1 link?

             •   fifteen seconds
             •   fifteen million seconds
             •   one hundred twenty seconds
             •   one hundred twenty thousand seconds




Perrine. J                                 07/15/09                          Page 38

More Related Content

PPTX
The Basics of Computer Networking
PPTX
Computer Networking 101
PPT
The basics of computer networking
PPT
Introduction to computer networks
PPTX
Networking Basics and Cisco
PPTX
Networking Basic and Cisco History
PDF
Lesson 1 introduction
PPTX
Introduction to computer networks
The Basics of Computer Networking
Computer Networking 101
The basics of computer networking
Introduction to computer networks
Networking Basics and Cisco
Networking Basic and Cisco History
Lesson 1 introduction
Introduction to computer networks

What's hot (20)

PPT
Introduction to computer networks
PPTX
Basic Computer Network
PPT
Introduction to Networks & Networking Concepts
PPT
Computer Networks workshop
PDF
Introduction to computer networks ppt download
PPT
Chapter 1 v n.2
PPT
Computer networks--osi model
PPTX
Networks
PDF
Networking Fundamentals: Computer Network Basics
PPTX
Acem lan
PPTX
Basics Of Comuter Networking
PDF
Computer networks
PDF
Data Communication
PPT
Introduction to computer networking
PPTX
local area network
PPTX
Computer Networking
PPT
NETWORK COMPONENTS
PDF
Computer networks
PPT
NETWORK STANDARD
Introduction to computer networks
Basic Computer Network
Introduction to Networks & Networking Concepts
Computer Networks workshop
Introduction to computer networks ppt download
Chapter 1 v n.2
Computer networks--osi model
Networks
Networking Fundamentals: Computer Network Basics
Acem lan
Basics Of Comuter Networking
Computer networks
Data Communication
Introduction to computer networking
local area network
Computer Networking
NETWORK COMPONENTS
Computer networks
NETWORK STANDARD
Ad

Similar to Q1 On Ch02 Networking Fundamentals (20)

PPT
Q1 On Ch08 Ethernet Switching
PPT
Q1 On Ch07 Ethernet Technologies
PPT
Q1 On Ch05 Cabling La Ns And Wa Ns
PPT
Q1 On Ch01 Introduction To Networking
PPT
VOICE
PPT
Q1 On Ch10 Routing Fundamentals And Subnets
PDF
Networking lec1 4
PDF
COM526_Lecture 1.pdf
PDF
BACKBONE NETWORKS
PDF
12110 computer networks
PDF
CBSE XII Communication And Network Concepts
PPTX
Network Protocol
PPT
Networking
PPTX
EDT 323 Internet and Intranet 2022 Final.pptx
PDF
Module1 introduction to network
PPTX
Tech 2 tech low latency networking on Janet presentation
PPT
Layer_arc_and_OSI_MODEL.ppt
PPT
Bcc comp4 ppt2
PDF
Smart x
PDF
Q1 On Ch08 Ethernet Switching
Q1 On Ch07 Ethernet Technologies
Q1 On Ch05 Cabling La Ns And Wa Ns
Q1 On Ch01 Introduction To Networking
VOICE
Q1 On Ch10 Routing Fundamentals And Subnets
Networking lec1 4
COM526_Lecture 1.pdf
BACKBONE NETWORKS
12110 computer networks
CBSE XII Communication And Network Concepts
Network Protocol
Networking
EDT 323 Internet and Intranet 2022 Final.pptx
Module1 introduction to network
Tech 2 tech low latency networking on Janet presentation
Layer_arc_and_OSI_MODEL.ppt
Bcc comp4 ppt2
Smart x
Ad

More from jerometnewman (6)

PPT
Q1 On Ch11 Tcpip And Application Layer
PPT
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
PPT
Q1 On Ch04 Cable Testing
PPT
Q1 On Ch03 Networking Media
DOC
PDF
Dell Certs
Q1 On Ch11 Tcpip And Application Layer
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch04 Cable Testing
Q1 On Ch03 Networking Media
Dell Certs

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
The AUB Centre for AI in Media Proposal.docx
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Q1 On Ch02 Networking Fundamentals

  • 1. Cisco 1 - Networking Basics Chapter 2 LANs were developed to solve which business needs? (Choose three.) 1. reduce duplication of equipment 2. promote the use of sneakernets 3. increase productivity while saving money 4. reduce the number of duplicate copies of files 5. connect users in different geographic locations 6. increase complexity of the work environment Perrine. J 07/15/09 Page 1
  • 2. Cisco 1 - Networking Basics Chapter 2 LANs were developed to solve which business needs? (Choose three.) • reduce duplication of equipment • promote the use of sneakernets • increase productivity while saving money • reduce the number of duplicate copies of files • connect users in different geographic locations • increase complexity of the work environment Perrine. J 07/15/09 Page 2
  • 3. Cisco 1 - Networking Basics Chapter 2 Which of the following were disadvantages of electronic bulletin boards? (Choose 3.) 1. Simultaneous user connections to multiple computers were very fast. 2. Availability was limited to those who knew the location. 3. They did not scale well to keep up with growing demand. 4. Users could not simultaneously share files. 5. Modem and telephone line requirements were demanding. Perrine. J 07/15/09 Page 3
  • 4. Cisco 1 - Networking Basics Chapter 2 Which of the following were disadvantages of electronic bulletin boards? (Choose 3.) • Simultaneous user connections to multiple computers were very fast. • Availability was limited to those who knew the location. • They did not scale well to keep up with growing demand. • Users could not simultaneously share files. • Modem and telephone line requirements were demanding. Perrine. J 07/15/09 Page 4
  • 5. Cisco 1 - Networking Basics Chapter 2 Which of the following are LAN design goals? (Choose three) 1. provide full-time connectivity to remote services 2. consolidate network devices and protocols to a single vendor 3. provide access to high-bandwidth media 4. operate within a limited geographic area 5. allow users to share files and printers 6. provide access to geographically separated networks Perrine. J 07/15/09 Page 5
  • 6. Cisco 1 - Networking Basics Chapter 2 Which of the following are LAN design goals? (Choose three) • provide full-time connectivity to remote services • consolidate network devices and protocols to a single vendor • provide access to high-bandwidth media • operate within a limited geographic area • allow users to share files and printers • provide access to geographically separated networks Perrine. J 07/15/09 Page 6
  • 7. Cisco 1 - Networking Basics Chapter 2 Which of the following are considered WAN technologies? (Choose three) 1. DSL 2. Ethernet 3. FDDI 4. Frame Relay 5. Modem 6. Token Ring Perrine. J 07/15/09 Page 7
  • 8. Cisco 1 - Networking Basics Chapter 2 Which of the following are considered WAN technologies? (Choose three) • DSL • Ethernet • FDDI • Frame Relay • Modem • Token Ring Perrine. J 07/15/09 Page 8
  • 9. Cisco 1 - Networking Basics Chapter 2 Why are networking standards needed? 1. Many networks now cover wide geographic area 2. Technologies must be compatible to allow communication 3. Hardware and software are continually being redesigned 4. LANs, MANs, and WANs use different kinds of equipment. Perrine. J 07/15/09 Page 9
  • 10. Cisco 1 - Networking Basics Chapter 2 Why are networking standards needed? • Many networks now cover wide geographic area • Technologies must be compatible to allow communication • Hardware and software are continually being redesigned • LANs, MANs, and WANs use different kinds of equipment. Perrine. J 07/15/09 Page 10
  • 11. Cisco 1 - Networking Basics Chapter 2 Why did networks experience problems in the mid-1980s? 1. Many new network technologies were incompatible 2. Employees preferred sneaker net 3. Common carriers went bankrupt 4. Everyone used the same hardware and software Perrine. J 07/15/09 Page 11
  • 12. Cisco 1 - Networking Basics Chapter 2 Why did networks experience problems in the mid-1980s? • Many new network technologies were incompatible • Employees preferred sneaker net • Common carriers went bankrupt • Everyone used the same hardware and software Perrine. J 07/15/09 Page 12
  • 13. Cisco 1 - Networking Basics Chapter 2 Which of the following are typical features that determine throughput? (Choose two.) 1. types of passwords used on servers 2. type of Layer 3 protocol used 3. network topology 4. length of the network cable 5. number of users on the network Perrine. J 07/15/09 Page 13
  • 14. Cisco 1 - Networking Basics Chapter 2 Which of the following are typical features that determine throughput? (Choose two.) • types of passwords used on servers • type of Layer 3 protocol used • network topology • length of the network cable • number of users on the network Perrine. J 07/15/09 Page 14
  • 15. Cisco 1 - Networking Basics Chapter 2 Which of the following would be used by a network administrator to calculate an estimate of network performance? (Choose two.) 1. size of file 2. protocol overhead 3. line bandwidth 4. encapsulation rate 5. bit error rate Perrine. J 07/15/09 Page 15
  • 16. Cisco 1 - Networking Basics Chapter 2 Which of the following would be used by a network administrator to calculate an estimate of network performance? (Choose two.) • size of file • protocol overhead • line bandwidth • encapsulation rate • bit error rate Perrine. J 07/15/09 Page 16
  • 17. Cisco 1 - Networking Basics Chapter 2 What is the OSI model? 1. A conceptual framework that specifies how information travels through networks 2. A model that describes how data makes its way from one application program to another through a network 3. A conceptual framework that specifies which network functions occur at each layer 4. All of the above Perrine. J 07/15/09 Page 17
  • 18. Cisco 1 - Networking Basics Chapter 2 What is the OSI model? • A conceptual framework that specifies how information travels through networks • A model that describes how data makes its way from one application program to another through a network • A conceptual framework that specifies which network functions occur at each layer • All of the above Perrine. J 07/15/09 Page 18
  • 19. Cisco 1 - Networking Basics Chapter 2 Which statements describe the network layer of the OSI model in relation to peer-to-peer communication? (Choose two.) 1. Data is encapsulated and a header is attached creating a packet. 2. Network layer information is encapsulated in a frame. 3. The header contains information required to complete the transfer, such as source and destination logical addresses. 4. A service is provided to the physical and the application layer of the OSI model. 5. Data is encapsulated into segments. 6. The header contains no error correction. Perrine. J 07/15/09 Page 19
  • 20. Cisco 1 - Networking Basics Chapter 2 Which statements describe the network layer of the OSI model in relation to peer-to-peer communication? (Choose two.) • Data is encapsulated and a header is attached creating a packet. • Network layer information is encapsulated in a frame. • The header contains information required to complete the transfer, such as source and destination logical addresses. • A service is provided to the physical and the application layer of the OSI model. • Data is encapsulated into segments. • The header contains no error correction. Perrine. J 07/15/09 Page 20
  • 21. Cisco 1 - Networking Basics Chapter 2 Which of the following are data link layer encapsulation details? (Choose two.) 1. Packets are put into frames. 2. Data is packaged into a packet. 3. Data is segmented into segments. 4. Data is converted for Internet travel. 5. An address is added to identify the directly connected device. Perrine. J 07/15/09 Page 21
  • 22. Cisco 1 - Networking Basics Chapter 2 Which of the following are data link layer encapsulation details? (Choose two.) • Packets are put into frames. • Data is packaged into a packet. • Data is segmented into segments. • Data is converted for Internet travel. • An address is added to identify the directly connected device. Perrine. J 07/15/09 Page 22
  • 23. Cisco 1 - Networking Basics Chapter 2 Which of the following terms refers to end-user devices that provide users with a connection to the network? 1. hub 2. router 3. host 4. server Perrine. J 07/15/09 Page 23
  • 24. Cisco 1 - Networking Basics Chapter 2 Which of the following terms refers to end-user devices that provide users with a connection to the network? • hub • router • host • server Perrine. J 07/15/09 Page 24
  • 25. Cisco 1 - Networking Basics Chapter 2 Which of the following best defines encapsulation? 1. Segmenting data so that it flows uninterrupted through the network 2. Compressing data so that it moves more quickly 3. Moving data in groups so that it stays together 4. Wrapping of data in a particular protocol header Perrine. J 07/15/09 Page 25
  • 26. Cisco 1 - Networking Basics Chapter 2 Which of the following best defines encapsulation? • Segmenting data so that it flows uninterrupted through the network • Compressing data so that it moves more quickly • Moving data in groups so that it stays together • Wrapping of data in a particular protocol header Perrine. J 07/15/09 Page 26
  • 27. Cisco 1 - Networking Basics Chapter 2 Which of the following physical topologies is used in situations where breaks in communications are unacceptable? 1. ring 2. star 3. mesh 4. bus Perrine. J 07/15/09 Page 27
  • 28. Cisco 1 - Networking Basics Chapter 2 Which of the following physical topologies is used in situations where breaks in communications are unacceptable? • ring • star • mesh • bus Perrine. J 07/15/09 Page 28
  • 29. Cisco 1 - Networking Basics Chapter 2 Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable technologies to securely connect mobile users and telecommuters to branch office networks? 1. Access VPN 2. Intranet VPN 3. Extranet VPN 4. Shared VPN Perrine. J 07/15/09 Page 29
  • 30. Cisco 1 - Networking Basics Chapter 2 Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable technologies to securely connect mobile users and telecommuters to branch office networks? • Access VPN • Intranet VPN • Extranet VPN • Shared VPN Perrine. J 07/15/09 Page 30
  • 31. Cisco 1 - Networking Basics Chapter 2 A contracting company is planning to allow its subcontractors and suppliers access to its network resources. It desires the security of knowing that the general public and competitors will not be able to access the information. Which of the following technologies should the company implement? 1. Access VPN 2. Dial-up VPN 3. Extranet VPN 4. Intranet VPN 5. Secure VPN 6. Wide-Area VPN Perrine. J 07/15/09 Page 31
  • 32. Cisco 1 - Networking Basics Chapter 2 A contracting company is planning to allow its subcontractors and suppliers access to its network resources. It desires the security of knowing that the general public and competitors will not be able to access the information. Which of the following technologies should the company implement? • Access VPN • Dial-up VPN • Extranet VPN • Intranet VPN • Secure VPN • Wide-Area VPN Perrine. J 07/15/09 Page 32
  • 33. Cisco 1 - Networking Basics Chapter 2 Which of the following are characteristics that cause bandwidth to vary? (Choose three.) 1. network technologies used 2. physics of the media 3. application in use 4. signaling methods 5. type of data Perrine. J 07/15/09 Page 33
  • 34. Cisco 1 - Networking Basics Chapter 2 Which of the following are characteristics that cause bandwidth to vary? (Choose three.) • network technologies used • physics of the media • application in use • signaling methods • type of data Perrine. J 07/15/09 Page 34
  • 35. Cisco 1 - Networking Basics Chapter 2 Which layer of the OSI model establishes, manages, and terminates communication between applications? 1. Application 2. Presentation 3. Session 4. Transport Perrine. J 07/15/09 Page 35
  • 36. Cisco 1 - Networking Basics Chapter 2 Which layer of the OSI model establishes, manages, and terminates communication between applications? • Application • Presentation • Session • Transport Perrine. J 07/15/09 Page 36
  • 37. Cisco 1 - Networking Basics Chapter 2 Which of the following is the approximate amount of time it would take to transmit a 23.1 megabyte file on a T1 link? 1. fifteen seconds 2. fifteen million seconds 3. one hundred twenty seconds 4. one hundred twenty thousand seconds Perrine. J 07/15/09 Page 37
  • 38. Cisco 1 - Networking Basics Chapter 2 Which of the following is the approximate amount of time it would take to transmit a 23.1 megabyte file on a T1 link? • fifteen seconds • fifteen million seconds • one hundred twenty seconds • one hundred twenty thousand seconds Perrine. J 07/15/09 Page 38