CISCO 1 Blended

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

CISCO 1 BL

BY: RINA GRACE M. DEMATAWARAN


AMA UNIVERSITY

Quiz 2
Question 1
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

Which two message timing mechanisms are used in data communication? (Choose two.)

Select one or more:


a. encoding
b. encapsulation
c. flow control 
d. response timeout 

e. formatting
Feedback

Your answer is correct.

Question 2
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

What type of protocol describes communication over a data link and the physical
transmission of data on the network media?

Select one:
a. Application protocol
b. Internet protocol
c. Transport protocol

d. Network access protocol 


Feedback

Your answer is correct.

Question 3
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

What command will prevent all unencrypted passwords from displaying in plain text in a
configuration file?

Select one:
a. (config-line) # password secret
b. (config)# enable password secret
c. (config) # service password-encryption 
d. (config) # enable secret Secret_Password

e. (config) # enable secret Encrypted_Password


Feedback

Your answer is correct.

Question 4
Correct
Mark 1.00 out of 1.00

Remove flag

Question text
Which application layer protocol allows users on one network to reliably transfer files to and
from a host on another network?

Select one:
a. FTP 
b. TFTP
c. HTTP
d. IMAP

e. DHCP
Feedback

Your answer is correct.

Question 5
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

What is an advantage of using standards to develop and implement protocols?

Select one:
a. Products from different manufacturers can interoperate successfully 
b. Standard provide flexibility for manufacturers to create devices that comply with unique
requirements
c. A particular protocol can only be implemented by one manufacturer

d. Different manufacturers are free to apply different requirements when implementing a


protocol
Feedback

Your answer is correct.

Question 6
Correct
Mark 1.00 out of 1.00
Remove flag

Question text

loopback
AAnswer  address is defined as a reserved address that routes packets back to the
host

Question 7
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

Which OSI reference model layer is responsible for common representation of the data
transferred between application layer services?

Select one:
a. Data link
b. Physical
c. Network
d. Application
e. Presentation 
f. Session

g. Transport
Feedback

Your answer is correct.

Question 8
Correct
Mark 1.00 out of 1.00
Remove flag

Question text

What three functions are defined by network protocols to allow communication between


known source and destination IP addresses? (Choose three.)

Select one or more:


a. message size 
b. delivery options 
c. data encoding 
d. connector specifications
e. media selection

f. end-device installation
Feedback

Your answer is correct.

Question 9
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

Which of the following are examples of proprietary protocols? (Choose two.)

Select one or more:


a. TCP/IP
b. Novell NetWare 
c. ISO

d. AppleTalk 
Feedback
Your answer is correct.

Question 10
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

What happens to frames that are too long or too short for the channel used?

Select one:
a. They are broken up into smaller pieces.
b. They are delivered but much slower than proper-size frames.
c. They are returned to the sender.
d. They are dropped. 

e. They clog the network and block the delivery of other frames.
Feedback

Your answer is correct.

Question 11
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

What name is given to a group of interrelated protocols necessary to perform a


communication function?

Select one:
a. Functional collection
b. Protocol suite 
c. Functional protocol
d. Protocol stack
Feedback

Your answer is correct.

Question 12
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

Which TCP/IP model layer is responsible for providing the best path through the network?

Select one:
a. Application
b. Transport
c. Network Access

d. Internet 
Feedback

Your answer is correct.

Question 13
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

What is and advantage of using standards to develop and implement protocols?

Select one:
a. Products from different manufacturers can interoperate successfully 
b. Standards provide flexibility for manufacturers to create devices that comply with unique
requirements
c. A particular protocol can be implemented by one manufacturer

d. Different manufacturers are free to apply different requirements when implementing a


protocol
Feedback

Your answer is correct.

Question 14
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

What happens when two devices on the same subnet are communicating?

Select one:
a. The sending device will use ARP to determine the IP address of the receiver
b. The host portion of the IP addresses will be different 
c. The frame will be sent to the default gateway for delivery to the receiving device

d. The data link layer addresses are added to the IP header


Feedback

Your answer is correct.

Question 15
Correct
Mark 1.00 out of 1.00

Remove flag

Question text

You might also like