Self assessment 1 اساسيات الشبكات
Question 1- Physical topology diagrams illustrate devices, ports, and the addressing scheme
of the network.
A-True
B-False
Question 2 Which of the following is the characteristics of a scalable network.
A-a private connection of LANs and WANs that belongs to an organization
B-uses existing electrical wiring to connect devices for home networks
C-limits the number of affected devices during a failure
D-grows in size without impacting existing users
Question 3- Which term describes a policy that allows network devices to manage the flow of
data to give priority to voice and video?
A-extranet
B-internet
C-intranet
D-quality of service
Question 4- What term describes storing personal files on servers over the internet to provide
access anywhere, anytime, and on any device?
A-cloud
B-quality of service
C-converged network
D-BYOD
Question 5- A large corporation has modified its network to allow users to access network
resources from their personal laptops and smart phones.
Which networking trend does this describe?
A-Bring Your Own Device (BYOD)
B-video conferencing
C-online collaboration
D-cloud computing
Question 6- What type of network traffic requires QoS?
A-wiki
B-email
C-video conferencing
D-on-line purchasing
Self Assessment 2
Question 1- After making configuration changes on a Cisco switch, a network
administrator issues a copy running-config startup-config command.
What is the result of issuing this command?
A-The new configuration will be stored in flash memory.
B-The configuration changes will be removed and the original configuration will be
restored.
C-The new configuration will be loaded if the switch is restarted.
D-The current IOS file will be replaced with the newly configured file.
Question 2- What function does pressing the Tab key have when entering a command
in IOS?
A-It moves the cursor to the end of the line.
B-It completes the remainder of a partially typed word in a command.
C-It moves the cursor to the beginning of the line.
D-It is used to exit the configuration mode and returns to EXEC mode.
Question 3- Shell is the user interface that allows users to request specific tasks from
the computer through the CLI or GUI interfaces.
A-True
B-False
Question 4-Which command or key combination allows a user to return to the
previous level in the command hierarchy?
A-Ctrl-Z
B-Ctrl-C
C-end
D-exit
Question 5- Why would a Layer 2 switch need an IP address?
A-to enable the switch to function as a default gateway
B-to enable the switch to send broadcast frames to attached PCs
C-to enable the switch to be managed remotely
D-to enable the switch to receive frames from attached PCs
Self Assessments 4
Question 1- What is the purpose of the OSI physical layer?
A-transmitting bits across the local media
B-controlling access to media
C-performing error detection on received frames
D-exchanging frames between nodes over physical network media
Question 2-Refer to the graphic. What type of cabling is shown?
A-STP
B-UTP
C-coax
D-fiber
Question 3-What OSI physical layer term describes the amount of time, including
delays, for data to travel from one point to another?
A-latency
B-Crosstalk
C-Throughput
D-Goodput
Question 4-Which characteristic describes crosstalk?
A-the distortion of the network signal from fluorescent lighting
B-the weakening of the network signal over long cable lengths
C-the loss of wireless signal over excessive distance from the access point
D-the distortion of the transmitted messages from signals carried in adjacent wires
Question 5-Crosstalk describes the measure of the transfer of bits across a medium
over a given period of time.
A-True
B-False
Self Assessments 5
Question 1-Which is the hexadecimal equivalent of 254?
A-FE
B-FA
C-EA
D-ED
Question 2-What is the decimal equivalent of the binary number 10010101?
A-168
B-192
C-149
D-153
Question 3-The hexadecimal equivalent of 202 is CA.
A-True
B-False
Question 4-The number of binary bits in an IPv4 address is 128.
A-True
B-False
Question 5-How many binary bits exist within an IPv6 address?
A-32
B-64
C-48
D-128
Quiz 1
Question 1-Which IOS made allows accesses to all commands and features?
A-Interface sub configuration mode
B-line console sub configuration mode
C-privileged exec mode
D-user exec mode
Question 2-Confidentiality, integrity, and availability are requirements of which of the
four basic characteristics of network architecture?
A-Fault tolerance
B-scalability
C-Qos
D-security
Question 3-During a routine inspection, a technician discovered that software that
was installed on a computer was secretly collecting data about websites that were
visited by users of the computer. Which type of threat is affecting this computer?
A-Dos attack
B-identity theft
C-spyware
D-zero-day attack
Question 4-An administrator uses the cnrl-shift-6 key combination on a switch after
issuing the ping command. What is the purpose of using these keystrokes?
A-to restart the ping process
B-to cancel the ping process
C-to exit to a difference configuration mode
D-to allow the user to compete the command
Question 5-Which of the following is the name for all computers connected to a
network that participated directly in network communication?
A-Switches
B-Intermediary devices
C-Hosts
D-Media
Question 6-Which option blocks unauthorized access to your network?
A-Firewall
B-Virus,worms, or Trojan horse
C-Zero-day or Zero-hour
D-Virtual Private Network (VPN)
Question 7- What term describes storing personal files on servers over the internet to
provide access anywhere, anytime, and on any device?
A-cloud
B-quality of service
C-converged network
D-BYOD
Question 8-What is the command to assign the name “Sw-Floor-2” to a switch?
A-hostname Sw-Floor-2
B-host name Sw-Floor-2
C-name Sw-Floor-2
D-host Sw-Floor-2
Question 9-Which two devices are intermediary devices?
A-Host
B-Routers
C-Servers
D-Switches
Question 10- Why would a Layer 2 switch need an Ip address?
A-to enable the switch to send broadcast frames to attached PCs.
B-to enable the switch to function as a default gateway.
C-to enable the switch to be managed remotely.
D-to enable the switch to receive frames from attached PCs
Question 11-Which secure access method would be the most appropriate in-band access to
the IOS over a network connection?
A-Console
B-Telnet
C-SSH
D-Aux
Question 12-Which command encrypts all plaintext passwords access on a switch?
A-secret
B-login
C-enable secret class
D-service password-encryption
Question 13-Which option describes malicious code running on user devices?
A-Firewall
B-Virus,worms, or Trojan horse
C-Zero-day or Zero-hour
D-Virtual Private Network (VPN)
Question 14-When data is encoded as pulses of light, which media is being used to
transmit the data?
A-Wireless
B-Fiber-optic cable
C-Copper cable
D-Coaxial cable
Question 15-What term describes a network where one computer can be both client
and server?
A-peer-to-peer
B-client/server
C-BYOD
D-quality of service
Quiz 2
Question 1-Which delivery method is used to transmit information to one or more end
devices, but not all devices on the network?
A-Unicast
B-Multicast
C-Broadcast
D-None of the above
Question 2-True or False. Standards organizations are usually vendor-neutral
A-True
B-False
Question 3-What type of communication will send a message to all devices on a local
area network?
A-Unicast
B-Multicast
C-Broadcast
D-None of the above
Question 4-This protocol is responsible for guaranteeing the reliable delivery of
information
A-TCP
B-IP
C-HTTP
D-Ethernet
Question 5- A web client is sending a request for a webpage to a web server. From the
perspective of the client, what is the correct order of the protocol stack that is used to
prepare the request for transmission?
A-HTTP,IP,TCP,Ethernet
B-HTTP,TCP,IP,Ethernet
C-IP,Ethernet,TCP,HTTP
D-Ethernet,TCP,IP,HTTP
Question 6-What is done to an IP packet before it is transmitted over the physical
medium?
A-It is tagged with information guaranteeing reliable delivery
B-It is encapsulated into a TCP segment
C-It is segmented into smaller individual pieces
D-it is encapsulated in a Layer 2 frame
Question 7-UDP and TCP belong to which layer of the TCP/IP protocol?
A-application
B-transport
C-internet
D-network access
Question 8-What is the name of the process of adding protocol information to data as
it moves down the protocol stack?
A- de-encapsulation
B-sequencing
C-segmentation
D-encapsulation
Question 9-What layer is responsible for routing messages through an internetworj in
the TCP/IP model?
A-Internet
B-transport
C-network access
D-session
Question 10- Which method allows a computer to react accordingly when it requests
data from a server and the server takes too long to respond?
A- encapsulation
B-flow control
C-access method
D-response timeout
Question 11- What method can be used by two computers to ensure that packets are
not dropped because too much data is being sent too quickly?
A-encapsulation
B-flow control
C-access method
D-response timeout
Question 12-What is the process of diving a large data stream into smaller pieces prior
to transmission?
A-Sequencing
B-duplexing
C-multiplexing
D-segmentation
Question 14-At which Osi layer is a source MAC address added to a PDU during the
encapsulation process?
A-data link layer
B-application layer
C-transport layer
D-presentation layer
Question 15-Which device performs the function of determining the path that
messages should take through internetworks?
A-router
B-a firewall
C- a web server
D-a DSL modem
Quiz 3
Question 1-Which of the following wireless standards is used for Personal Area
Networks (PANs) and allows devices to communicate over distances of 1 to 100
meters?
A-Zigbee
B-WiMAX
C-Wi-Fi
D-Bluetooth
Question 2-True or False. Wireless LANs operate in full-duplex allowing all devices to
send or receive data at the same time so the number of users does not impact
performance
A-True
B-False
Question 3-What is the binary equivalent of the decimal number 70?
A-01000111
B-00011000
C-01110010
D-01000110
Question 4-What is the decimal equivalent of C9?
A-185
B-201
C-200
D-199
Question 5-Which of the following terminates with BNC, N type and F type
connectors?
A-UTP
B-STP
C-Coaxial
D-Fiber-Optic
Question 6-What type of cable is used to connect a workstation serial port to a Cisco
router console port?
A-Rollover
B-crossover
C-coaxial
D-straight-through
Question 7-True or False? The physical layer is only concerned with wired network
connections.
A-True
B-False
Question 8-What is the decimal equivalent of the hex number 3F?
A-93
B-77
C-63
D-87
Question 9-What is the binary representation of AB?
A-10101011
B-11011010
C-10111010
D-11010101
Question 10-Which of the following is the decimal equivalent of 7D?
A-124
B-125
C-126
D-127
Question 11-Which media uses patterns of light to represent bits?
A-Copper
B-Wireless
C-Fiber-Optic
D-Wired
Question 12-How many bits are in an IPv4 address?
A-128
B-48
C-32
D-64
Question 13-Which of these is a measure of the transfer of bits across the media?
A-Bandwidth
B-Throughput
C-Goodput
D-All of the above
Question 14- Refer to the graphic. What type of cabling is shown?
A-STP
B-UTP
C-coax
D-fiber
Question 15-What is one advantage of using fiber optic cabling rather than copper
cabling?
A-It is easier to terminate and install than copper cabling.
B-It is usually cheaper than copper cabling.
C-It is able to be installed around sharp bends.
D-It is able to carry signals much farther than copper cabling.
Question 15-Which of these is the name for the capacity of a medium to carry data?
A-Bandwidth
B-Throughput
C-Goodput
D-All of the above
Question 16-What is the decimal equivalent of A9?
A-168
B-169
C-170
D-171
Question 17-What is the binary representation of CA?
A-11001010
B-11011010
C-10111010
D-11010101
Question 18-What is the binary representation of EF?
A-11001010
B-11101111
C-11110111
D-11010101
Question 19-Which of the following counters EMI and RFI by using shielding
techniques and special connectors?
A-UTT
B-STP
C-MAC
D-TCP
Question 20-Which procedure is used to reduce the effect of crosstalk in copper
cables?
A-designing a cable infrastructure to avoid crosstalk interference
B-avoiding sharp bends during installation
C-twisting opposing circuit wire pairs together
D-requiring proper grounding connections
Question 21- How many binary bits exist within an IPv6 address?
A-32
B-64
C-48
D-128
Question 22-Which type of UTP cable is used to connect a PC to a switch port?
A-straight-through
B-Console
C-crossover
D-rollover