You are on page 1of 2

Modul 1 NETWORKING TODAY

1.Leased lines are reserved circuits within the service provider’s network that
connect geographically separated offices for private voice and/or data networking.
The circuits are rented at a monthly or yearly rate....
The statement above is the meaning of?...

a.Dedicated Leased Line


b.Metro Ethernet
c.DSL Bisnis
d.Satelit
ANSWER : A.Dedicated Leased Line

2.Securing a network involves protocols, technologies, devices, tools, and


techniques in order to protect data and mitigate threats.
Threat vectors may be external or internal. Many external network security
threats today originate from the internet.

There are several common external threats to networks:(except)?

a.Virus, worm, dan trojan horse


b.Spyware dan adware
c.Denial of service attacks
d.Firewall
ANSWER : D.Firewall

Modul 2 BASIC SWITCH AND END DEVICE CONFIGURATION

1.Which statement is true about the running configuration file in a Cisco IOS
device?

a.it is stored in NVRAM


b.it should be deleted using erase running-config command.
c.it is automatically saved when the routers reboots
d.it affects the operation of the device immediately when modified.
ANSWER : C.it affects the operation of the device immediately when modified.

2.An administrator has just changed the IP address of an interface on an IOS


device.
What else must be done in order to apply those changes to the device?

a.Copy the running configuration to the startup configuration file.


b.Copy the information in the startup configuration file to the running
configuration.
c.Reload the device and type yes when prompted to save the configuration.
d.Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the commmand is typed correctly and the Enter key has been
pressed.
ANSWER : D.Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the commmand is typed correctly and the Enter key has been
pressed.

Modul 3 PROTOCOLS AND MODELS

1.The following describes the routing protocols,EXCEPT?...

a.OSPF - Open Shortest Path First.


b.HTTP - Hypertext Transfer Protocol.
c.EIGRP - EIGRP - Enhanced Interior Gateway Routing Protocol.
d.BGP - Border Gateway Protocol.
ANSWER : B.HTTP - Hypertext Transfer Protocol.

2.What is the purpose of protocols in data communications?

a.dictating the content of the message sent during communication.


b.specifying the device operating systems that will support the
communiaction
c.providing the rules required for a specific type of communication to occur
d.specifying the bandwidth of the channel or medium for each type of communication
ANSWER : C.providing the rules required for a specific type of communication to
occur

Modul 4 PYHYSICAL LAYER

1.Which statement correctly describes frame encoding?

a.It generates the electrical, optical, or wireless signals that represent the
binary numbers of the frame.
b.it transmits data signals along with a clock signal which occurs at evenly
spaced time durations.
c.It converts bits into a predefined code in order to provide a predictable
pattern to help distinguish data bits from control bits.
d.it uses characterisric of one wave to modify another wave
ANSWER :

2.A network administrator is designing a new network infrastructure that includes


both wired and wireless connectivity. Under which situation would a wireless

a.The end-user device requires a dedicated connection because of


performance requirements.
b.The end-user device only has an Ethernet NIC.
c.The end-user device needs mobility when connecting to the network.
d.The end-user device area has a high concentration of RFI.
ANSWER : B.The end-user device only has an Ethernet NIC.

You might also like