• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CCNA CHAPTER 1 EXAM QUESTIONS

Exam (elaborations) Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

CCNA CHAPTER 1 EXAM QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -100 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: Should carpeting or similar materials should exist in a room with critical network components?

Answer:

No, since they can create static electricity that can damage the components.

Question 2: What does a security policy define, and what is derived from it?

Answer:

What people can and can't do with network components, and a security solution is derived from the security policy.

Question 3: Describe packet-switched services.

Answer:

Packet-switched services are similar to cell-switched services, except where cell-switched services switch fixed-length packets called cells, packet-switched services switch variable-length packets. This feature makes them better suited for data services.

Question 4: Name 5 common network protocols.

Answer:

Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol version 4 (IMAP4), Post Office Protocol 3 (POP3), File Transfer Protocol (FTP), and Hypertext Transfer Protocol (HTTP)

Question 5: Describe the mesh topology in a network environment.

Answer:

It describes how network components are connected together, and can be either full or partial.

Question 6: Describe 3 logical security controls.

Answer:

Idle timeout on logins, passwords, and authentication methods.Question 7: Why should a monitoring system be used to protect against environmental threats?

Answer:

So that an administrator can take immediate action if anomalies occur in temperature or humidity.

Question 8: What are the 2 types of security controls?

Answer:

Physical or logical.

Question 9: What are 4 types of physical installation threats?

Answer:

Hardware, electrical, environmental, and maintenance.Question 10: What are 2 maintenance points about methods to mitigate electrical threats?

Answer:

Mitigation systems should be monitored and periodically tested.

Question 11: What are Wide Area Networks (WAN's) used for?

Answer:

To connect LAN's together, even when they are separated by a large distance.

Question 12: Describe full meshing.

Answer:

Every network component is connected to every other network component.

Question 13: Describe 3 types of network attacks and their solutions, including recommended devices.

Answer:

1) Reconnaissance - Mitigation: ACL's Devices: IPS, IDS, routers 2) Access - Mitigation: Authentication, port security, virtual LANs (VLANs), ACLs, virtual private

networks (VPNs) Devices: Switches, routers, firewalls, IPS, IDS

3) DoS - Mitigation: ACL's Devices: IPS, IDS, firewalls, routers.

Question 14: What is a reconnaissance attack?

Answer:

When an adversary tries to learn information about a network.Question 15: What is the purpose of network filters, such as Access Control Lists?

Answer:

To restrict access to network components and their information, such as only allowing accounting employees access to the accounting server.

Question 16: Describe a star topology.

Answer:

A central device has many point-to-point connections to other components. Star topologies are used in environments where many different devices need to be connected, with a hub or switch at the center of the star.

Question 17: Describe a possible DoS attack scenario.

Answer:

Flooding millions of packets or injecting code into an application or overrunning the buffer(s) of an application, causing it to crash.

Question 18: Describe an insider network attack.

Answer:

An inside adversary attempts to eavesdrop, copy, or cause damage to information, often using a sniffing tool such as Wireshark.

Question 19: Describe a distributed network attack.

Answer:

An adversary introduces code, such as a Trojan horse or back-door program, to a "trusted" component or software that will later be distributed to many other companies and users.

Question 20: What are 2 types of DoS attacks?

Answer:

Flood attacks, such as Internet Control Message Protocol (ICMP) and TCP SYN flooding, as well as buffer overrun attacks Question 21: What is a good encryption solution to guard network login information?

Answer:

"Encrypt information between two network components so that login credentials cannot be viewed; for example, it is better to use SSH instead of telnet for remote access because SSH encrypts the session traffic."

Question 22: Describe 4 physical security controls.

Answer:

Sign in and out logs, locks, guards, and doors.

Question 23: What are 7 networking devices that are used in WAN connections?

Answer:

Cable and DSL modems, carrier switches, CSU/DSU's, firewalls, modems, NT1's, and routers.

Question 24: What is a network Adversary, and give 7 examples.

Answer:

An adversary is a person or persons interested in attacking your network. Common adversaries include disgruntled employees, unskilled and skilled hackers, criminals, other countries, terrorists, and competing companies.

Question 25: How do you mitigate a social engineering attack?

Answer:

Network users should go through proper training about the kinds of information that they can or can't share with other people.

Question 26: How do you reduce the likelihood of hardware threats?

Answer:

Please critical network components in locked rooms that are not accessible by windows, air vents, dropped-down ceilings, or raised flooring.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Exam (elaborations)
Description:

PDF Download CCNA CHAPTER 1 EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -100 Questions and Answers -format set of multiple-choice -Expe...

UNLOCK ACCESS $11.99