Tampilkan postingan dengan label oot. Tampilkan semua postingan
Soal Beserta jawaban Latihan CCNA 1
CHAPTER 4
STMIK Nusa Mandiri Jakarta



1. Why are two strands of fiber used for a single fiber optic connection?
They allow for full-duplex connectivity.
The two strands allow the data to travel for longer distances without degrading.
They prevent crosstalk from causing interference on the connection.
They increase the speed at which the data can travel.\



2. What is indicated by the term throughput?
the measure of the usable data transferred across the media
the capacity of a particular medium to carry data
the measure of the bits transferred across the media over a given period of time
the guaranteed data transfer rate offered by an ISP
the time it takes for a message to get from sender to receiver



3. What are two examples of hybrid topologies? (Choose two.)
partial mesh
full mesh
hub and spoke
extended star
point-to-point



4. What is a role of the Logical Link Control sublayer?
to provide access to various Layer 1 network technologies
to mark frames to identify the network layer protocol being carried
to provide data link layer addressing
to define the media access processes performed by network hardware



5. 

PC on the left connects to a switch. This connection is labeled 1. The switch connects to a router. This connection is labeled 2. The router connects to another router. This link is labeled 3.
Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?​
1 - crossover, 2 - straight-through, 3 - rollover
1 - crossover, 2 - rollover, 3 - straight-through
1 - rollover, 2 - straight-through, 3 - crossover
1 - rollover, 2 - crossover, 3 - straight-through




6. Which statement describes an extended star topology?
Each end system is connected to its respective neighbor via an intermediate device.
End devices are connected together by a bus and each bus connects to a central intermediate device.
End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.
All end and intermediate devices are connected in a chain to each other.



7. What is one advantage of using fiber optic cabling rather than copper cabling?
It is able to be installed around sharp bends.
It is usually cheaper than copper cabling.
It is easier to terminate and install than copper cabling.
It is able to carry signals much farther than copper cabling.



8. Which type of connector does a network interface card use?
DIN
RJ-45
RJ-11
PS-2



9. What is the function of the CRC value that is found in the FCS field of a frame?
to verify the physical address in the frame
to verify the integrity of the received frame
to verify the logical address in the frame
to compute the checksum header for the data field in the frame



10. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
physical
transport
application
data link



11. As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?​
The transmitting node inserts start and stop bits into the frame.
The receiving node identifies the beginning of a frame by seeing a physical address.
The transmitting node sends a beacon to notify that a data frame is attached.

The transmitting node sends an out-of-band signal to the receiver about the beginning of the frame.



12. What is true concerning physical and logical topologies?
Physical topologies display the IP addressing scheme of each network.
Physical topologies are concerned with how a network transfers frames.
Logical topologies refer to how a network transfers data between devices.
The logical topology is always the same as the physical topology.



13. Option 1: laser as light source. Press spacebar to enter matching mode. 
Match the characteristics to the correct type of fiber. (Not all options are used.)


supports full-duplex operation
Multimode Fiber
LED as light source
several paths of light into the fiber
generally used for campus backbone
Single-mode Fiber
only one ray of light into the fiber
generally used with LANs
laser as light source



14. 

The graphic displays a terminated RJ45 connector. The untwisted wires at the end of the PVC sheath are crimped by the connector.
Refer to the exhibit. What is wrong with the displayed termination?
The woven copper braid should not have been removed.
The wrong type of connector is being used.
The wires are too thick for the connector that is used.
The untwisted length of each wire is too long.



15. What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)
to distinguish data from control information
to provide better media error correction
to identify where the frame starts and ends
to increase the media throughput
to reduce the number of collisions on the media


16. What is the definition of bandwidth?
the measure of the transfer of bits across the media over a given period of time
the speed at which bits travel on the network
the amount of data that can flow from one place to another in a given amount of time
the measure of usable data transferred over a given period of time



17. What is contained in the trailer of a data-link frame?
data
logical address
physical address
error detection



18. What are two services performed by the data link layer of the OSI model? (Choose two.)
It accepts Layer 3 packets and encapsulates them into frames.
It monitors the Layer 2 communication by building a MAC address table.
It provides media access control and performs error detection.
It encrypts data packets.
It determines the path to forward packets.



19. A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)
crosstalk
signal attenuation
extended length of cabling
EMI
RFI​



20. Which method of data transfer allows information to be sent and received at the same time?
simplex
half duplex
full duplex
multiplex



21. Which characteristic describes crosstalk?
the loss of wireless signal over excessive distance from the access point
the distortion of the network signal from fluorescent lighting
the distortion of the transmitted messages from signals carried in adjacent wires
the weakening of the network signal over long cable lengths



22. A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
packet collision
mobility options
interference
security
extensive cabling
coverage area



23. What technique is used with UTP cable to help protect against signal interference from crosstalk?
twisting the wires together into pairs
encasing the cables within a flexible plastic sheath
terminating the cable with special grounded connectors
wrapping a foil shield around the wire pairs

Soal Beserta jawaban Latihan CCNA 1
CHAPTER 3
STMIK Nusa Mandiri Jakarta


1. Option 3: This organization promotes the open development, evolution, and use of the Internet throughout the world.. Press spacebar to enter matching mode. 
Match the description to the organization. (Not all options are used.)

ISOC
This organization promotes the open development, evolution, and use of the Internet throughout the world.
ISO
This organization is the largest developer of international standards in the world for a wide variety of products and services. It is known for its Open Systems Interconnection (OSI) reference model.
EIA
                                                                                                            
IANA
This organization is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers.



2. What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
ARP
NAT
PPP
DHCP
DNS
FTP



3. Which statement is true about the TCP/IP and OSI models?​
The OSI Layer 7 and the TCP/IP application layer provide identical functions.
The TCP/IP network access layer has similar functions to the OSI network layer.​
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.​
The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.​



4. What process is used to place one message inside another message for transfer from the source to the destination?
access control
flow control
decoding
encapsulation



5. At which layer of the OSI model would a logical address be added during encapsulation?
transport layer
data link layer
physical layer
network layer
Bottom of FormTop of Form



6 .
Option 3: message encapsulation. Press spacebar to enter matching mode. 
Match each description to its corresponding term. (Not all options are used.)


the process of determining when to begin sending messages on a network
                                                                                                            
the process of converting information from one format into another acceptable for transmission
message encoding
the process of placing one message format inside another message format
message sizing
the process of unpacking one message format from another message format
                                                                                                            
the process of breaking up a long message into individual pieces before being sent over the network
message encapsulation

Bottom of Form


7. What is an advantage of network devices using open standard protocols?
Network communications is confined to data transfers between devices from the same vendor.
Competition and innovation are limited to specific types of products.
A client host and a server running different operating systems can successfully exchange data.
Internet access can be controlled by a single ISP in each market.



8. Which characteristic describes the default gateway of a host computer?
the physical address of the switch interface connected to the host computer
the physical address of the router interface on the same network as the host computer
the logical address of the router interface on the same network as the host computer
the logical address assigned to the switch interface connected to the router



9. What are proprietary protocols?
protocols that can be freely used by any organization or vendor
protocols developed by organizations who have control over their definition and operation
protocols developed by private organizations to operate on any vendor hardware
a collection of protocols known as the TCP/IP protocol suite



10. Which statement is correct about network protocols?
They define how messages are exchanged between the source and the destination.
They all function in the network access layer of TCP/IP.
They are only required for exchange of messages between devices on remote networks.
Network protocols define the type of hardware that is used and how it is mounted in racks.



11. What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
flow control
access method
encapsulation
response timeout


12. What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.



13. What is an advantage of using standards to develop and implement protocols?
A particular protocol can only be implemented by one manufacturer.
Products from different manufacturers can interoperate successfully.
Standards provide flexibility for manufacturers to create devices that comply with unique requirements.
Different manufacturers are free to apply different requirements when implementing a protocol.



14. Which PDU format is used when bits are received from the network medium by the NIC of a host?
segment
frame
file
packet



15. What type of communication will send a message to all devices on a local area network?
multicast
allcast
unicast
broadcast



16. Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)
application
transport
session
physical
network
presentation
data link



17.
Host1 connects to Switch1 and then to Router1. Router1 connects to Router2 via a serial link. Router2 connects to Switch2 and Switch2 connects to a server. Router2 also connects to an ISP via a serial link.
Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?
application, session, transport, network, data link, and physical layers
only Internet and network access layers
only application and Internet layers
only application, transport, network, data link, and physical layers
application, transport, Internet, and network access layers
only application, Internet, and network access layers



18. Which address does a NIC use when deciding whether to accept a frame?
source MAC address
destination MAC address
destination IP address
source Ethernet address
source IP address



19. A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
Ethernet, IP, TCP, HTTP
HTTP, IP, TCP, Ethernet
Ethernet, TCP, IP, HTTP
HTTP, TCP, IP, Ethernet



20. Option 4: taking the segments from the transport protocol, encapsulating them into packets, and assigning them with appropriate addresses. Press spacebar to enter matching mode. 
Match the protocol function to the description while taking into consideration that a network client is visiting a web site. (Not all options are used.)


application protocol
governing the way a web server and a web client interact
internet protocol
taking the segments from the transport protocol, encapsulating them into packets, and assigning them with appropriate addresses
network access protocol
preparing packets to be transmitted over the network media
network time protocol
                                                                                                            
transport protocol
managing the individual conversations between web servers and web clients



21. Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
frame
segment
bits
packet



22. 
 
HostA is connected to RouterA through SwitchA. RouterA connects to RouterB via a serial link. RouterB is connected to ServerB through SwitchB.
Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)
A packet with the destination IP address of ServerB.
A frame with the destination MAC address of SwitchA.
A packet with the destination IP address of RouterA.
A packet with the destination IP address of RouterB.
A frame with the destination MAC address of ServerB.
A frame with the destination MAC address of RouterA.
Copyright © 2013 Sulhansubs