CCNA 1 Module 1 Study Guide
CCNA 1 Module 1 Study Guide
1.4.2 18. List the characteristics of WANs. a. WANs interconnect LANs over
wide geographical areas such as
between cities, states, provinces,
countries, or continents.
b. WANs are usually administered by
multiple service providers.
c. WANs typically provide slower
speed links between LANs
1.4.2 19. What area of the network would a. Wireless LAN
allow students to bring their own
tablets and smartphones to school
to access school resources?
1.4.3 20. What type of network must a home The Internet
user access in order to do online
shopping?
1.4.4 21. What is designed to be accessible Intranet
only by the organization's members,
employees, or others with
authorization?
1.4.4 22. What are used by companies to Extranets, or extended internetworks
provide suppliers, vendors, and
customers limited access to
corporate data to check order
status, inventory, and parts lists?
1.6.5 43. What are two types of network a. Network infrastructure security
security concerns for network b. Information security.
administrators?
1.6.5 44. What security goal requires only the Confidentiality
intended recipients can access and
read the data?
1.6.5 45. What security goal requires the Integrity
assurance that the information has
not been altered during
transmission?
1.6.5 46. What security goal requires the Availability
assurance of timely and reliable
access to data?
1.6.5 47. Which data protection goal Data Confidentiality
implements a policy that requires
strong, complex passwords?
1.6.6 Do the activity and get your
instructor’s initials to prove
completion
1.7.2 48. What refers to the policy that allows Bring Your Own Device (BYOD
employees to use their personal
devices in the business office to
access the network and other
resources?
1.7.3 49. What is “the act of working with Online Collaboration
another or others on a joint project.”
Using a tool like WebEx?
1.7.5 Video: Cisco Webex for Huddles
1.7.6 50. What is being used if applications Cloud Computing
can be accessed over the Internet
by individual users or businesses
using any device, anywhere in the
world?
1.7.6 51. What are the different types of a. Public
clouds? b. Private
c. Hybrid
d. Community
1.8.1 56. What security violation would cause Capturing of personal data that leads
the most amount of damage to the to identity theft
life of a home user?
1.8.2 57. Which two actions would provide a. Implementing a firewall
the minimum security requirements b. Installing antivirus software
for this network?
1.8.2 58. List the security requirements for a. Dedicated Firewall systems
large corporate networks? b. Access Control Lists
c. Intrusion Prevention Systems
d. Virtual Private Networks
1.8.3 Do the activity and get your
instructor’s initials to prove
completion
1.9.1 59. Which certification demonstrates The Cisco Certified Network Associate
that you have a knowledge of (CCNA)
foundational technologies and
ensures you stay relevant with skill
sets needed for the adoption of
next-generation technologies?
1.9.3 Lab: Research IT and Networking
Job Opportunities