0% found this document useful (0 votes)
47 views5 pages

Cnna Weekly Test

This document contains a weekly test on networking concepts with 41 multiple choice questions covering topics like network topologies, infrastructure types, cloud computing models, and security principles. The questions are designed to assess understanding of fundamental networking and IT terminology, configurations, and architectures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views5 pages

Cnna Weekly Test

This document contains a weekly test on networking concepts with 41 multiple choice questions covering topics like network topologies, infrastructure types, cloud computing models, and security principles. The questions are designed to assess understanding of fundamental networking and IT terminology, configurations, and architectures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CNNA WEEKLY TEST

1. Which of the following is the name for all computers connected to a network that participate
directly in network communication?
a. Server c. Host
b. Intermediary devices d. Media

2. When data is encoded as pulses of light, which media is being used to transmit the data?
a. Wireless c. copper cable
b. Fiber- optic cable d. none

3. Which two devices are intermediary devices? (Choose two)


a. Host and Router c. Switches and Router
b. Servers and Switches d. Host and Servers

4. Which connection physically connects the end device to the network?


a. Port c. Interface
b. Nic

5. Which connections are specialized ports on a networking device that connect to individual
networks?
a. Port c. Interface
b. Nic

6. Which type of network topology lets you see which end devices are connected to which
intermediary devices and what media is being used?
a. Physical Topology b. Logical Topology

7. Which type of network topology lets you see the actual location of intermediary devices and
cable installation?
a. Physical Topology b. Logical Topology

8. A connector or outlet on a networking device that connects to an end device or another


networking device.
a. Port c. Interface
b. Nic

9. In small businesses and homes, many computers function as the servers and clients on the
network.
a. Peer to Peer c. Server
b. Host d. End devices

10. It is either the source or destination of a message transmitted over the network.
a. Host c. Peer to Peer
b. End devices d. Server

11. Which connect the individual end devices to the network?


a. Intermediary Devices c. Server
b. End devices d. Hosts

12. Which network infrastructure provides access to users and end devices in a small
geographical area, which is typically a network in a department in an enterprise, a home, or
small business?
a. Extranet c. LAN
b. Intranet d. WAN

13. Which network infrastructure might an organization use to provide secure and safe access to
individuals who work for a different organization but require access to the organization’s
data?
a. Extranet c. LAN
b. Intranet d. WAN

14. Which network infrastructure provides access to other networks over a large geographical
area, which is often owned and managed by a telecommunications service provider?
a. Extranet c. LAN
b. Intranet d. WAN

15. When designers follow accepted standards and protocols, which of the four basic
characteristics of network architecture is achieved?
a. Fault Tolerance c. QoS
b. Scalability d. Security

16. Confidentiality, integrity, and availability are requirements of which of the four basic
characteristics of network architecture?
a. Fault Tolerance c. QoS
b. Scalability d. Security

17. With which type of policy, a router can manage the flow of data and voice traffic, giving
priority to voice communications if the network experiences congestion?
a. Fault Tolerance c. QoS
b. Scalability d. Security

18. Having multiple paths to a destination is known as redundancy. This is an example of which
characteristic of network architecture?
a. Fault Tolerance c. QoS
b. Scalability d. Security

19. A network architecture that limits the number of affected devices during a failure.
a. Fault Tolerance c. QoS
b. Scalability d. Security

20. A network architecture that expands quickly to support new users and applications
a. Fault Tolerance c. QoS
b. Scalability d. Security

21. Primary mechanism for managing congestion and ensuring reliable delivery of content to all
users.
a. Fault Tolerance c. QoS
b. Scalability d. Security

22. A network architecture that built to allow quick recovery when such a failure occurs.
a. Fault Tolerance c. QoS
b. Scalability d. Security

23. Only the intended and authorized recipients can access and read data.
a. Confidentiality c. Availability
b. Integrity

24. Assures users that the information has not been altered in transmission, from origin to
destination.
a. Confidentiality c. Availability
b. Integrity

25.  Assures users of timely and reliable access to data services for authorized users.
a. Confidentiality c. Availability
b. Integrity

26. Which feature is a good conferencing tool to use with others who are located elsewhere in
your city, or even in another country?
a. BYOD c. Cloud Computing
b. Video Communication

27. Which feature describes using personal tools to access information and communicate across
a business or campus network?
a. BYOD c. Cloud Computing
b. Video Communication

28. Which feature contains options such as Public, Private, Custom and Hybrid?
a. BYOD c. Cloud Computing
b. Video Communication

29. Which feature is being used when connecting a device to the network using an electrical
outlet?
a. Smart Home Technology c. Wireless broadband
b. Powerline
30. Which feature uses the same cellular technology as a smartphone?
a. Smart Home Technology c. Wireless broadband
b. Powerline

31. Services may be free or are offered on a pay-per-use model, such as paying for online
storage.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

32. Can be set up using the organization’s private network, though this can be expensive to build
and maintain.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

33. Made up of two or more clouds (example: part private, part public), where each part remains
a distinct object, but both are connected using a single architecture.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

34. Created for exclusive use by specific entities or organizations.


a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

35. A Cloud-based applications and services offered in a ________________are made available


to the general population.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

36. Uses the internet to provide services.


a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

37. Cloud-based applications and services offered in a ___________________ are intended for a
specific organization or entity, such as a government. 
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

38. Can also be managed by an outside organization with strict access security.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

39. A __________________is made up of two or more clouds (example: part private, part public),
where each part remains a distinct object, but both are connected using a single architecture.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

40. Are used by multiple organizations that have similar needs and concerns
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

41. Similar to a public cloud environment, but with set levels of security, privacy, and even
regulatory compliance of a private cloud
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds

You might also like