Cnna Weekly Test
Cnna Weekly Test
1. Which of the following is the name for all computers connected to a network that participate
directly in network communication?
a. Server c. Host
b. Intermediary devices d. Media
2. When data is encoded as pulses of light, which media is being used to transmit the data?
a. Wireless c. copper cable
b. Fiber- optic cable d. none
5. Which connections are specialized ports on a networking device that connect to individual
networks?
a. Port c. Interface
b. Nic
6. Which type of network topology lets you see which end devices are connected to which
intermediary devices and what media is being used?
a. Physical Topology b. Logical Topology
7. Which type of network topology lets you see the actual location of intermediary devices and
cable installation?
a. Physical Topology b. Logical Topology
9. In small businesses and homes, many computers function as the servers and clients on the
network.
a. Peer to Peer c. Server
b. Host d. End devices
10. It is either the source or destination of a message transmitted over the network.
a. Host c. Peer to Peer
b. End devices d. Server
12. Which network infrastructure provides access to users and end devices in a small
geographical area, which is typically a network in a department in an enterprise, a home, or
small business?
a. Extranet c. LAN
b. Intranet d. WAN
13. Which network infrastructure might an organization use to provide secure and safe access to
individuals who work for a different organization but require access to the organization’s
data?
a. Extranet c. LAN
b. Intranet d. WAN
14. Which network infrastructure provides access to other networks over a large geographical
area, which is often owned and managed by a telecommunications service provider?
a. Extranet c. LAN
b. Intranet d. WAN
15. When designers follow accepted standards and protocols, which of the four basic
characteristics of network architecture is achieved?
a. Fault Tolerance c. QoS
b. Scalability d. Security
16. Confidentiality, integrity, and availability are requirements of which of the four basic
characteristics of network architecture?
a. Fault Tolerance c. QoS
b. Scalability d. Security
17. With which type of policy, a router can manage the flow of data and voice traffic, giving
priority to voice communications if the network experiences congestion?
a. Fault Tolerance c. QoS
b. Scalability d. Security
18. Having multiple paths to a destination is known as redundancy. This is an example of which
characteristic of network architecture?
a. Fault Tolerance c. QoS
b. Scalability d. Security
19. A network architecture that limits the number of affected devices during a failure.
a. Fault Tolerance c. QoS
b. Scalability d. Security
20. A network architecture that expands quickly to support new users and applications
a. Fault Tolerance c. QoS
b. Scalability d. Security
21. Primary mechanism for managing congestion and ensuring reliable delivery of content to all
users.
a. Fault Tolerance c. QoS
b. Scalability d. Security
22. A network architecture that built to allow quick recovery when such a failure occurs.
a. Fault Tolerance c. QoS
b. Scalability d. Security
23. Only the intended and authorized recipients can access and read data.
a. Confidentiality c. Availability
b. Integrity
24. Assures users that the information has not been altered in transmission, from origin to
destination.
a. Confidentiality c. Availability
b. Integrity
25. Assures users of timely and reliable access to data services for authorized users.
a. Confidentiality c. Availability
b. Integrity
26. Which feature is a good conferencing tool to use with others who are located elsewhere in
your city, or even in another country?
a. BYOD c. Cloud Computing
b. Video Communication
27. Which feature describes using personal tools to access information and communicate across
a business or campus network?
a. BYOD c. Cloud Computing
b. Video Communication
28. Which feature contains options such as Public, Private, Custom and Hybrid?
a. BYOD c. Cloud Computing
b. Video Communication
29. Which feature is being used when connecting a device to the network using an electrical
outlet?
a. Smart Home Technology c. Wireless broadband
b. Powerline
30. Which feature uses the same cellular technology as a smartphone?
a. Smart Home Technology c. Wireless broadband
b. Powerline
31. Services may be free or are offered on a pay-per-use model, such as paying for online
storage.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds
32. Can be set up using the organization’s private network, though this can be expensive to build
and maintain.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds
33. Made up of two or more clouds (example: part private, part public), where each part remains
a distinct object, but both are connected using a single architecture.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds
37. Cloud-based applications and services offered in a ___________________ are intended for a
specific organization or entity, such as a government.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds
38. Can also be managed by an outside organization with strict access security.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds
39. A __________________is made up of two or more clouds (example: part private, part public),
where each part remains a distinct object, but both are connected using a single architecture.
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds
40. Are used by multiple organizations that have similar needs and concerns
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds
41. Similar to a public cloud environment, but with set levels of security, privacy, and even
regulatory compliance of a private cloud
a. Public clouds c. Hybrid clouds
b. Private clouds d. Community Clouds