Ad Blocker Detectado
Nuestro sitio web es posible al mostrar anuncios en línea a nuestros visitantes. Por favor considere apoyarnos deshabilitando su bloqueador de anuncios.
Ránking de puntuaciones: CCNA1 v6.0 Chapter 1 Exam
Posición | Nombre | Realizado el | Puntos | Resultado |
---|---|---|---|---|
La tabla se está cargando | ||||
No hay datos disponibles | ||||
Límite de tiempo: 0
SUmario del cuestionario
0 de 24 preguntas completado
Preguntas:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
Información
CCNA1 v6.0 Chapter 1 Exam
Ya has realizado este cuestionario antes. Por tanto, no puedes empezarlo otra vez.
Cargando el cuestionario...
Debes ser un usuario registrado para poder realizar el cuestionario.
Tienes que terminar antes el siguiente cuestionario, para iniciar este cuestionario:
Resultados
0 de 24 preguntas contestadas correctamente
Tu tiempo:
El tiempo se ha terminado
Has conseguido 0 de 0 puntos posibles (0)
Puntuación de promedio: |
|
Tu puntuación |
|
Categorías
- No asignada a ninguna categoría 0%
Tus resultado se han guardado en el ránking
Cargando
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- Contestada
- Revisada
-
Pregunta 1 de 24
1. Pregunta
3 puntosA company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)
Correcto
Incorrecto
-
Pregunta 2 de 24
2. Pregunta
1 puntosWhich device performs the function of determining the path that messages should take through internetworks?
Correcto
Incorrecto
-
Pregunta 3 de 24
3. Pregunta
2 puntosWhat two criteria are used to help select a network medium from various network media? (Choose two.)
Correcto
Incorrecto
-
Pregunta 4 de 24
4. Pregunta
2 puntosWhich two statements describe intermediary devices? (Choose two.)
Correcto
Incorrecto
-
Pregunta 5 de 24
5. Pregunta
2 puntosWhat are two functions of end devices on a network? (Choose two.)
Correcto
Incorrecto
-
Pregunta 6 de 24
6. Pregunta
1 puntosWhich area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?
Correcto
Incorrecto
-
Pregunta 7 de 24
7. Pregunta
1 puntosWhat type of network must a home user access in order to do online shopping?
Correcto
Incorrecto
-
Pregunta 8 de 24
8. Pregunta
1 puntosAn employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
Correcto
Incorrecto
-
Pregunta 9 de 24
9. Pregunta
2 puntosWhich two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)
Correcto
Incorrecto
-
Pregunta 10 de 24
10. Pregunta
2 puntosWhich two Internet connection options do not require that physical cables be run to the building? (Choose two.)
Correcto
Incorrecto
-
Pregunta 11 de 24
11. Pregunta
1 puntosWhich term describes the state of a network when the demand on the network resources exceeds the available capacity?
Correcto
Incorrecto
-
Pregunta 12 de 24
12. Pregunta
1 puntosWhat type of network traffic requires QoS?
Correcto
Incorrecto
-
Pregunta 13 de 24
13. Pregunta
1 puntosWhich expression accurately defines the term bandwidth?
Correcto
Incorrecto
-
Pregunta 14 de 24
14. Pregunta
1 puntosA network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?
Correcto
Incorrecto
-
Pregunta 15 de 24
15. Pregunta
1 puntosWhich statement describes a characteristic of cloud computing?
Correcto
Incorrecto
-
Pregunta 16 de 24
16. Pregunta
1 puntosWhat is the Internet?
Correcto
Incorrecto
-
Pregunta 17 de 24
17. Pregunta
1 puntosWhich statement describes the use of powerline networking technology?
Correcto
Incorrecto
-
Pregunta 18 de 24
18. Pregunta
1 puntosWhat security violation would cause the most amount of damage to the life of a home user?
Correcto
Incorrecto
-
Pregunta 19 de 24
19. Pregunta
2 puntosA user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)
Correcto
Incorrecto
-
Pregunta 20 de 24
20. Pregunta
1 puntosFill in the blank.
- A (converged, Converged) network is capable of delivering voice, video, text, and graphics over the same communication channels.
Correcto
Incorrecto
-
Pregunta 21 de 24
21. Pregunta
1 puntosFill in the blank.
- The acronym (byod, BYOD) refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.
Correcto
Incorrecto
-
Pregunta 22 de 24
22. Pregunta
4 puntosMatch the description to the form of network communication. (Not all options are used.)
Ordenar elementos
- an audio-based medium that allows people to deliver their recordings to a wide audience
- Interactive websites where people created and share user-generated content with friends and family
- Web pages that groups of people can edit and view together
- real-time communication of between two or more people
-
podcast
-
Social media
-
wiki
-
instant messaging
Correcto
Incorrecto
-
Pregunta 23 de 24
23. Pregunta
4 puntosMatch each characteristic to its corresponding Internet connectivity type. (Not all options are used.)
Ordenar elementos
- Not suited for heavily wooded areas
- typically has very low bandwidth
- splits the access line into three signals
- uses coaxial cable as a medium
-
satellite
-
dialup telephone
-
DSL
-
cable
Correcto
Incorrecto
-
Pregunta 24 de 24
24. Pregunta
3 puntosMatch the definition to the security goal. (Not all options are used.)
Ordenar elementos
- maintaining integrity
- ensuring confidentiality
- ensuring availability
-
the assurance that the information has not been altered during transmission
-
only the intended recipients can access and read the data
-
the assurance of timely and reliable access to data
Correcto
Incorrecto
GICOVI STELLA MUTHONI
assignment submission