IT Networking Fundamentals for CISCO CCNA Exam

IT Networking Fundamentals for CISCO CCNA Exam

Networking Fundamentals for CISCO CCNA Exam

In this Networking Fundamentals course complete CISCO CCNA syllabus is covered. First trainer will explain concept after that he will take some examples on that concept. So you will get complete CISCO CCNA course practically. After completing this course you can easily face CISCO CCNA paper for global certification

A strong foundation of basic networking concepts is fundamental to a successful career in information technology.

Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success.

In this cisco ccna course You will gain an understanding of basic network functions, standards, and protocols, to prepare you to tackle advanced networking skills.

Networking Fundamentals for CISCO CCNA Exam PRACTICE QUESTION AND ANSWERS

Defining Networks with the OSI Model

Question 1.

How many layers are incorporated in the OSI model communications subnetwork?
A. 2
B. 7
C. 3
D. 4

Answer 1. C. 3

Question 2.

Which of the following layers deals with the serial transfer of data?
A. Physical
B. Data Link
C. Network
D. Session

Answer 2. A. Physical

Question 3

When installing a router on a company’s network that will allow access to the Internet, the
device will reside on which layer of the OSI model?
A. Physical
B. Data Link
C. Network
D. Transport

Answer 3. C. Network

Question 4.

When executing the netstat –an command in the Command Prompt window, many connections
are made that say TCP in the leftmost column. Which layer of the OSI model is
TCP referring to?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4

Answer 4. D. Layer 4

Question 5.

A problem is suspected with a computer’s network adapter and its ability to send the correct
frames of data that correspond with the network architecture used by the rest of the computers.
Which layer should be used as a troubleshooting starting point?
A. Physical
B. Data Link
C. Network
D. Transport

Answer 5. B. Data Link

Question 6.

A standard such as 100BASE-T refers to which OSI layer?
A. Physical
B. Data Link
C. Network
D. Transport

Answer 6. A. Physical

Question 7.

At an organization, almost all users connect to websites with Internet Explorer. They usually
type domain names such as www.microsoft.com. Which protocol is initiated by default
when they press Enter after typing the domain name?
A. FTP
B. HTTPS
C. HTTP
D. HTP

Answer 7. C. HTTP

Question 8.

A director has given permission to access his computer. To find out the MAC address of the
director’s computer, the Command Prompt application is accessed. Which command should
be used to see the MAC address?
A. ipconfig
B. ipconfig/all
C. arp
D. netstat -an

Answer 8. B. ipconfig/all

Question 9.

Which of the following commands should be used to view all of the MAC addresses of
computers that a particular user’s computer has connected to in the recent past?
A. ping 127.0.0.1
B. netstat -a
C. arp -a
D. arp -s

Answer 9 C. arp -a

Question 10.

Which of the following tools should be used to capture and analyze packets on a server?
(Choose the two best answers.)
A. Protocol analyzer
B. Command Prompt
C. netstat -an
D. Wireshark

Answer 10. A, D. Protocol analyzer, Wireshark

Understanding Wired and Wireless Networks

Networking Fundamentals

Question 11.

When installing 200 twisted-pair cable drops, which wiring standard should be used?
A. 568A
B. BOGB
C. 568B
D. 586B

Answer 11. C. 568B

Question 12.

To connect two laptops directly to each other by way of their network adapters, which kind
of cable should be used?
A. Rolled cable
B. Crossover cable
C. Straight-through cable
D. Patch cable

Answer 12. B. Crossover cable

Question 13.

When making a specialized wired connection for a server that will operate on an Ethernet
network, which two wiring colors should be used?
A. Orange and green
B. Orange and blue
C. Orange and brown
D. White and blue

Answer 13. A. Orange and green

Question 14.

One of the network connections to a programmer’s computer has failed. She suspects it is
the twisted-pair cable. Which tool should be used to test for any problems in the cable?
A. Patch tester
B. Wireshark
C. Continuity tester
D. Fox and hound

Answer 14. C. Continuity tester

Question 15.

You need to connect three new supercomputers to the backbone of the network that runs at
1 Gbps. Which type of cable will be sufficient for this task?
A. Category 3
B. Category 5
C. Category 5e
D. Category 10a

Answer 15. C. Category 5e

Question 16.

A network contains many fiber-optic connections. Which of the following does not belong
in the fiber network?
A. FC connector
B. ST connector
C. TOSLINK
D. 8P8C

Answer 16. D. 8P8C

Question 17.

When connecting 802.11a, 802.11b, and 802.11n wireless networks together, which wireless
device will guarantee connectivity between these networks?
A. Wireless network adapter
B. Wireless hub
C. Wireless router
D. Wireless bridge

Answer 17. D. Wireless bridge

Question 18.

You need to connect three new laptops to the wireless network “WLAN42.” It runs at a
speed of 54 Mbps only and a frequency of 2.4 GHz only. Which IEEE 802.11 standard
should be implemented when connecting the laptops to the WAP?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Answer 18. C. 802.11g

Question 19.

A desktop computer needs to be connected to a WLAN using the strongest encryption type
possible. Which of the following is the strongest?
A. WEP
B. RADIUS
C. WPA2
D. WPA

Answer 19. C. WPA2

Question 20.

Thirteen PCs and laptops have been connected to a wireless network. To make the WLAN
more secure, which of the following tasks disallows additional client access to the WAP?
A. Enabling channel bonding
B. Enabling frame aggregation
C. Disabling SSID broadcasting
D. Disabling WPA2

Answer 20. C. Disabling SSID broadcasting

item image

Buy Now From The Best


Agile project management Artificial Intelligence aws blockchain cloud computing coding interview coding interviews Collaboration Coursera css cybersecurity cyber threats data analysis data breaches data science data visualization devops django docker finance flask hacking html It Certification java javascript ketan kk Kubernetes machine learning machine learning engineer mongoDB Network & Security network protocol nodejs online courses online learning Operating Systems Other It & Software python Software Engineering Terraform Udemy courses VLAN web development

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.