CCNA 1 Assignments Introduction To Networking (V5 + V6) Chapter 4 Answers 100% correct

Hi! Before you start reading this post please make sure to leave a comment if you caught any error or missing Question. Also if you have a new question then please write down below in comment section. Following solution is for chapter 4 in CCNA 1 Introduction to Networking (v6 and lower) module given in Netacad Academy assignment.

1. Why are two strands of fiber used for a single fiber optic connection?
  • The two strands allow the data to travel for longer distances without degrading.
  • They prevent crosstalk from causing interference on the connection.
  • They increase the speed at which the data can travel.
  • They allow for full-duplex connectivity.*

2. Which type of connector does a network interface card use?
  • DIN
  • PS-2
  • RJ-11
  • RJ-45*

3. What is one advantage of using fiber optic cabling rather than copper cabling?
  • It is usually cheaper than copper cabling.
  • It is able to be installed around sharp bends.
  • It is easier to terminate and install than copper cabling.
  • It is able to carry signals much farther than copper cabling.*

4. Refer to the exhibit. What is wrong with the displayed termination?
  • The woven copper braid should not have been removed.
  • The wrong type of connector is being used.
  • The untwisted length of each wire is too long.*
  • The wires are too thick for the connector that is used

5. Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?

  • 1 – rollover, 2 – crossover, 3 – straight-through
  • 1 – rollover, 2 – straight-through, 3 – crossover*
  • 1 – crossover, 2 – straight-through, 3 – rollover
  • 1 – crossover, 2 – rollover, 3 – straight-through

6. What technique is used with UTP cable to help protect against signal interference from crosstalk?
  • twisting the wires together into pairs*
  • wrapping a foil shield around the wire pairs
  • encasing the cables within a flexible plastic sheath
  • terminating the cable with special grounded connectors

7. Which characteristic describes crosstalk?
  • the distortion of the network signal from fluorescent lighting
  • the distortion of the transmitted messages from signals carried in adjacent wires*
  • the weakening of the network signal over long cable lengths
  • the loss of wireless signal over excessive distance from the access point

8. A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)
  • EMI*
  • crosstalk
  • RFI*
  • signal attenuation
  • extended length of cabling

9. What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)
  • to reduce the number of collisions on the media
  • to distinguish data bits from control bits*
  • to provide better media error correction
  • to identify where the frame starts and ends*
  • to increase the media throughput
  • to distinguish data from control information

10. What is indicated by the term throughput?
  • the guaranteed data transfer rate offered by an ISP
  • the capacity of a particular medium to carry data
  • the measure of the usable data transferred across the media
  • the measure of the bits transferred across the media over a given period of time*
  • the time it takes for a message to get from sender to receiver

11. What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame? LLC

12. What is the function of the CRC value that is found in the FCS field of a frame?
  • to verify the integrity of the received frame*
  • to verify the physical address in the frame
  • to verify the logical address in the frame
  • to compute the checksum header for the data field in the frame

13. What is the definition of bandwidth?
  • the measure of usable data transferred over a given period of time
  • the speed at which bits travel on the network
  • the measure of the transfer of bits across the media over a given period of time
  • the amount of data that can flow from one place to another in a given amount of time*

14. What is a role of the Logical Link Control sublayer?
  • to provide data link layer addressing
  • to provide access to various Layer 1 network technologies
  • to define the media access processes performed by network hardware
  • to mark frames to identify the network layer protocol being carried*

15. As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?
  • The transmitting node inserts start and stop bits into the frame.*
  • The transmitting node sends a beacon to notify that a data frame is attached.
  • The receiving node identifies the beginning of a frame by seeing a physical address.
  • The transmitting node sends an out-of-band signal to the receiver about the beginning of the frame

16. What is contained in the trailer of a data-link frame?
  • logical address
  • physical address
  • data
  • error detection*

17. Which method of data transfer allows information to be sent and received at the same time?
  • full duplex*
  • half duplex
  • multiplex
  • simplex

18. Which statement describes an extended star topology?
  • End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.*
  • End devices are connected together by a bus and each bus connects to a central intermediate device.
  • Each end system is connected to its respective neighbor via an intermediate device.
  • All end and intermediate devices are connected in a chain to each other.

19. Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit?


  • All three networks use CSMA/CA
  • None of the networks require media access control.
  • Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.*
  • Network 1 uses CSMA/CA and Network 2 uses CSMA/CD.
  • Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.

20. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
  • application
  • transport
  • data link*
  • physical

21. A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
  • mobility options
  • security *
  • interference *
  • coverage area*
  • extensive cabling
  • packet collision

22. What is true concerning physical and logical topologies?

  • The logical topology is always the same as the physical topology.
  • Physical topologies are concerned with how a network transfers frames.
  • Physical topologies display the IP addressing scheme of each network.
  • Logical topologies refer to how a network transfers data between devices.*

23. What are two services performed by the data link layer of the OSI model? (Choose two.)
  • It encrypts data packets.
  • It determines the path to forward packets.
  • It accepts Layer 3 packets and encapsulates them into frames. *
  • It provides media access control and performs error detection.*
  • It monitors the Layer 2 communication by building a MAC address table.
24. The term bandwidth indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).

25. Match the characteristics to the correct type of fiber. (Not all options are used.)
Double click to view image large

Multimode Fiber
LED as light source*
several paths of light into the fiber*
generally used with LANs*

Single-mode Fiber
only one ray of light into the fiber*
generally used for campus backbone*
laser as light source*

26. Fill in the blank.
A physical topology that is a variation or combination of a point-to-point, hub and spoke, or mesh topology is commonly known as a hybrid topology.

27. What are two examples of hybrid topologies? (Choose two.)
  • point-to-point
  • partial mesh*
  • extended star*
  • hub and spoke
  • full mesh

Now from Onward the rest of the MCQs is for the Lower version

1. How is the magnetic field cancellation effect enhanced in UTP cables?
  • by increasing the thickness of the PVC sheath that encases all the wires
  • by increasing and varying the number of twists in each wire pair*
  • by increasing the thickness of the copper wires
  • by decreasing the number of wires that are used to carry data

2. Which statement is correct about multimode fiber?

  • Multimode fiber cables carry signals from multiple connected sending devices.
  • Multimode fiber commonly uses a laser as a light source.
  • SC-SC patch cords are used with multimode fiber cables.*

3. Which statement describes signaling at the physical layer?

  • Sending the signals asynchronously means that they are transmitted without a clock signal.*
  • In signaling, a 1 always represents voltage and a 0 always represents the absence of voltage.
  • Wireless encoding includes sending a series of clicks to delimit the frames.
  • Signaling is a method of converting a stream of data into a predefined code

4. The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing 
sessions, acknowledgments, and encapsulation is 15 Mb/s for the same time period. What is the goodput for this network?
  • 15 Mb/s
  • 95 Mb/s
  • 55 Mb/s
  • 65 Mb/s*
  • 80 Mb/s

5. What are two characteristics of 802.11 wireless networks? (Choose two.)

  • They use CSMA/CA technology.*
  • They use CSMA/CD technology.
  • They are collision-free networks.
  • Stations can transmit at any time.
  • Collisions can exist in the networks.*

6. What is the purpose of the FCS field in a frame?
  • to obtain the MAC address of the sending node
  • to verify the logical address of the sending node
  • to compute the CRC header for the data field
  • to determine if errors occurred in the transmission and reception*

7. A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?
  • 802.11n
  • 802.11ac*
  • 802.11g
  • 802.11b

8. What is one main characteristic of the data link layer?
  • It generates the electrical or optical signals that represent the 1 and 0 on the media.
  • It converts a stream of data bits into a predefined code.
  • It shields the upper layer protocol from being aware of the physical medium to be used in the communication.*
  • It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.

9. Fill in the blank with a number.
10,000,000,000 b/s can also be written as 10 Gb/s.

10. Match the steps to the physical layer operations that occur when data is sent from one node and received at another node.
Refer to the exhibit.
Double click to view large image

11. Which statement describes the media access control methods that are used by the networks in the exhibit?
  • All three networks use CSMA/CA
  • None of the networks require media access control.
  • Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.*
  • Network 1 uses CSMA/CA and Network 2 uses CSMA/CD.
  • Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.
Previous Post
Next Post
Related Posts