CCNA 4 Exploration v4.0 Chapter 1 Quiz Answers

1. Which three items are considered to be WAN devices? (Choose three.)

  • bridges
  • modems
  • routers
  • Layer 2 switches
  • communication servers
  • repeaters

2. Which layer of the hierarchical network design model is often referred to as the backbone?

  • access
  • distribution
  • network
  • core
  • workgroup
  • WAN

3. Drag the description on the left to the associated term on the right.

CCNA 4 Exploration v4.0 Chapter 1 Quiz Answers 1

4. Drag the description of the packet-switched technology on the left to the associated term on the right.

CCNA 4 Exploration v4.0 Chapter 1 Quiz Answers 2

5. Which device is commonly used as Data Terminal Equipment?

  • ISDN
  • modem
  • router
  • CSU/DSU

Explanation: The DTE transmits the data from a customer network or host computer over the WAN. The DTE connects to the local loop through the DCE. A router is a DTE device and uses a CSU/DSU (DCE device) when connecting to the WAN.

6. Which type of WAN connection should be chosen when a dedicated point-to-point WAN communications path from the customer premises through the provider network to a remote destination is required?

  • Integrated Services Digital Network (ISDN)
  • analog dial-up
  • Asynchronous Transfer Mode (ATM)
  • Frame Relay (FR)
  • leased line

Explanation: A leased line is a dedicated point-to-point link usually leased from a carrier.

7. How are Frame Relay virtual circuits identified?

  • CIR
  • DLCI
  • VPI
  • MAC
  • SPID

Explanation: Frame Relay virtual circuits are uniquely identified by a DLCI, which ensures bidirectional communication from one DTE device to another.

8. What WAN technology is designed for delivering data, voice, and video simultaneously over a TDM infrastructure?

  • ATM
  • cable
  • Frame Relay
  • ISDN

9. Which architecture enables enterprises to offer important network services, such as security, new communication services, and improved application performance to every office regardless of its size or proximity to headquarters?

  • Cisco Enterprise Campus Architecture
  • Cisco Enterprise Data Center Architecture
  • Cisco Enterprise Branch Architecture
  • Cisco Enterprise Teleworker Architecture

Explanation: The Cisco Enterprise Branch Architecture allows businesses to extend the applications and services found at the campus network to various remote locations and users independent of size and location.

10. At which layer of the hierarchical design model do users connect to the network?

  • application
  • access
  • distribution
  • network
  • core

11. ISDN PRI is composed of how many B channels in North America?

  • 2
  • 16
  • 23
  • 30
  • 64

Explanation: ISDN PRI in North America delivers 23 B channels with 64 kbps and one D channel with 64 kbps in North America, for a total bit rate of up to 1.544 Mbps.

12. The ability to connect securely to a private network over a public network is provided by which WAN technology?

  • DSL
  • Frame Relay
  • ISDN
  • PSTN
  • VPN

Explanation: VPNs are used to tunnel data securely between two private networks over a public network such as the Internet.

13. Which hierarchical design model layer is responsible for containing network problems to the workgroups in which they occur?

  • application
  • access
  • distribution
  • network
  • core

Explanation: The distribution layer segments workgroups, which isolates any network problems within that subnet or VLAN. Routing between VLANs typically occurs at the distribution layer.

14. Which term describes the cabling that connects the customer site to the nearest exchange of the WAN service provider?

  • CPE
  • CO
  • local loop
  • DCE
  • DTE

Explanation: The local loop cabling that connects the CPE at the subscriber site to the CO of the service provider. The local loop is also sometimes called the “last mile.”

15. Which goal can be accomplished by the implementation of the Cisco Enterprise Teleworker Architecture?

  • It allows the enterprise to add large branch sites that span large geographic areas.
  • It allows the enterprise to deliver secure voice and data services to workers no matter where or when they work.
  • In order to reduce remote security threats, it forces users who are located at main sites to log on to resources.
  • It satisfies telephony requirements for users who are located at medium to large enterprise sites.
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x