CCNA TEST PAPER 3 WITH ANSWERS V5-1 & V6-0


1 Which device performs the function of determining the path that messages should take through internetworks?
  1.  a router
       2. a firewall
       3. a web server
  4. a DSL modem
ANSWER:1
2 Which expression accurately defines the term bandwidth?
  • 1. a method of limiting the impact of a hardware or software failure on the network
  • 2. a measure of the data carrying capacity of the media
  • 3. a state where the demand on the network resources exceeds the available capacity
  • 4. a set of techniques to manage the utilization of network resources
ANSWER: 2
3 Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
  • 1. DSL
  • 2. cellular
  • 3. satellite
  • 4. dialup
  • 5. dedicated leased line
ANSWER:2&3

4 Which two statements describe intermediary devices? (Choose two.)
  • 1. Intermediary devices generate data content.
  • 2. Intermediary devices alter data content.
  • 3. Intermediary devices direct the path of the data.
  • 4. Intermediary devices connect individual hosts to the network.
  • 5. Intermediary devices initiate the encapsulation process.
ANSWER:3&4
5 Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
  • 1. convergence
  • 2. congestion
  • 3. optimization
  • 4. synchronization
ANSWER:2
6 Which statement describes a characteristic of cloud computing?
  • 1. A business can connect directly to the Internet without the use of an ISP.
  • 2. Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.
  • 3. Devices can connect to the Internet through existing electrical wiring.
  • 4. Investment in new infrastructure is required in order to access the cloud.
ANSWER:2
7 What security violation would cause the most amount of damage to the life of a home user?
  • 1. denial of service to your email server
  • 2. replication of worms and viruses in your computer
  • 3. capturing of personal data that leads to identity theft
  • 4. spyware that leads to spam emails
ANSWER:3
8 The acronym ____ refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.
 ANSWER.BYOD


9 What two criteria are used to help select a network medium from various network media? (Choose two.)
  • 1. the types of data that need to be prioritized
  • 2. the cost of the end devices utilized in the network
  • 3. the distance the selected medium can successfully carry a signal
  • 4. the number of intermediary devices installed in the network
  • 5. the environment where the selected medium is to be installed
ANSWER:3&5
10 What are two functions of end devices on a network? (Choose two.)
  • 1. They originate the data that flows through the network.
  • 2. They direct data over alternate paths in the event of link failures.
  • 3. They filter the flow of data to enhance security.
  • 4. They are the interface between humans and the communication network.
  • 5. They provide the channel over which the network message travels.
ANSWER:1&4

Comments

Popular posts from this blog

CCNA TEST PAPER 6 WITH ANSWERS V5-1 & V6-0

CCNA TEST PAPER 1 WITH ANSWERS V5-1 & V6-0

CCNA TEST PAPER 8 WITH ANSWERS V5-1 & V6-0