SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
2046
Hub
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Source and Destination IP address
2. How many bits make up an IPv4 address?
No collisions will occur on this link.
Application Layer
The physical address is added.
32 bits
3. What are 2 email components used to forward mail between servers?
A. MTA b. SMTP
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Static
4. When do changes take effect in a Cisco router?
Identify the device that allows local network computers to communicate w/ devices in other networks.
UDP
As the commands are entered.
2046
5. 2 functions of encapsulation
80 (HTTP)
255.255.255.0
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Application Layer
6. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Network Layer Packet
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A backbone cable.
A. Cat5 UTP b. Cat6 UTP
7. What kind of problems are caused by excessive broadcast traffic on network segments?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Network Access
8. Important characteristic of UDP
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
They must wait until the first hosts finish transfering the media.
2046
Minimal delays in data delivery.
9. What is the primary purpose of ARP?
Rollover cable
A. low overhead b. connectionless
Resolve IPv4 addresses to MAC addresses.
The physical address is added.
10. What do end devices do?
They must wait until the first hosts finish transfering the media.
Network address
Originate data flow.
A. they initiate data exchanges b. they may upload data to servers
11. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
UDP
It uses lasers as the light source.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Wireless
12. Default Gateway is incorrect on the host - What is the impact on the communications?
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Logical Link Control sublayer
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
13. 3 factors that should be considered when implementing Layer 2 protocols
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Originate data flow.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
14. 3 statements about the role of routers in the network
A. flow control b. session establishment c. numbering and sequencing
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Flash
15. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
UTP
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
RJ-45
16. 2 characteristics of peer-2-peer
Ctrl + Shift + 6
A. decentralized resources b. resource sharing w/o a dedicated server
Identify processes or services that are communicating with end devices.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
17. What are 2 common characteristics associated w/ dynamic routing protocols?
Identify the device that allows local network computers to communicate w/ devices in other networks.
FTP
SSH
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
18. Which IP packet field will prevent endless loops?
Network Access
8
Time-to-live (TTL)
Router
19. What is PDU?
SSH
Is a layer of specific encapsulation.
Network address
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
20. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
255.255.255.0
172.16.192.160
Logical Link Control sublayer
A. non-deterministic b. less overhead c. collisions exist
21. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
The physical address is added.
A. minimizing of collisions b. division into broadcast domains
A. purpose b. geographic location c. ownership
Network Layer Packet
22. What is a benefit of a WAN?
Host mobility
A. MTA b. SMTP
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
The destination host address.
23. At which layer of the TCP/IP model does ethernet operate?
The packets will be delivered and reassembled at destination.
Any device whose backoff timer expires first.
Network Access
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
24. What is a protocol that provides connectionless network layer services?
A. router b. firewall
IP Protocol
The magnetic field around the adjacent pairs of wire.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
25. What causes crosstalk within cable pairs when using UTP?
A. low overhead b. connectionless
The magnetic field around the adjacent pairs of wire.
The MAC protocol can be very simple.
A. media sharing b. logical topology
26. What is a disadvantage of Telnet?
A. next-hop b. metric/interface c. destination network address
It has expanded adressing capabilities.
It does not support encryption.
It uses lasers as the light source.
27. What can you identify when you examine the Network Layer header?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
The destination host address.
Router(config)# interface FastEthernet 0/1
A. low overhead b. connectionless
28. 3 protocols that operate in the application layer
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. DNS b. SMTP c. POP
Signal loss can be experienced.
Application Layer
29. What layer encapsulates segments into packets?
It has expanded adressing capabilities.
Twisting of the cables
Network Layer
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
30. What is the function of the DLL?
It provides for the exchange of data over a common local media.
DNS
255.255.255.0
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
31. What is dinamically selected by the source host when forwarding data?
Source Port
They must wait until the first hosts finish transfering the media.
Rollover cable
A. application b. presentation c. session d. transmision e. network f. data link g. physical
32. What command can be used to determine if the router has experienced any input or output errors?
A. Physical b. Data Link
A. minimizing of collisions b. division into broadcast domains
Show Interfaces
The physical address is added.
33. What is an automated service that matches resource names w/ required IP addresses?
DNS
A. application b. services
A. identifies the communicating applications b. identifies multiple conversations between the hosts
255.255.255.224
34. What application layer protocol is used to support file transfers between client and server?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Logical Link Control sublayer
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
FTP
35. What do the intermediary devices in the network do?
A. low overhead b. connectionless
A. goodput b. throughput c. bandwidth
The packets will be delivered and reassembled at destination.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
36. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
A. perform degradation b. security issues c. host identification
Window Size
32 bits
MAC
37. What are 2 commands used to view a host routing table?
A. netstat -r b. route PRINT
Create signals that represent the bits in each frame for the media.
SMB
Minimal delays in data delivery.
38. 3 functions of the upper data link sublayer in the OSI model
Window Size
A physical topology.
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Destination Network Address
39. 2 characteristics of clients in data networks
A. they initiate data exchanges b. they may upload data to servers
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Resolve IPv4 addresses to MAC addresses.
Flash
40. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
A. it has centralized administration b. security is easier to enforce
Transport
A. the router will discard the packet b. the router will send a time exceeded message to the source host
The magnetic field around the adjacent pairs of wire.
41. What are 3 pieces of info about a route contained in a routing table?
SSH
It provides for the exchange of data over a common local media.
A. purpose b. geographic location c. ownership
A. next-hop b. metric/interface c. destination network address
42. 3 statements of media acess control
It uses support from the lower layers to distinguish between connections to the service.
Supports error detection.
Application Layer
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
43. There are too many broadcasts on switches - what can be done?
A. replace a switch w/ a router b. subnet the new networks
Show Interfaces
0 to 1023
A. servers b. routers c. network printers
44. What does the IEEE 802.2 standard represent in Ethernet technologies?
Router(config)# interface FastEthernet 0/1
It does not support encryption.
Logical Link Control sublayer
Is used by the server to resolve names.
45. 3 features that allow TCP to realibly and accurately track the transmission of data
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. flow control b. session establishment c. numbering and sequencing
0 to 1023
Network Media Control
46. What is the purpose of the TCP/IP Network Application Layer?
Network address
Network Media Control
Next-Hop Address
Is used by the server to resolve names.
47. 3 properties of peer-2-peer applications
A. application b. services
A. netstat -r b. route PRINT
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
To enable a receiving host to forward the data to the appropriate application.
48. What is the purpose of resource records in DNS?
Minimal delays in data delivery.
Is used by the server to resolve names.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. not affected by EMI of RFI b. most expensive type of LAN cabling
49. What is the purpose of the preamble in an ethernet frame?
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. identifies the communicating applications b. identifies multiple conversations between the hosts
It uses support from the lower layers to distinguish between connections to the service.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
50. What determines the method of media access control?
A. they initiate data exchanges b. they may upload data to servers
They must wait until the first hosts finish transfering the media.
A. purpose b. geographic location c. ownership
A. media sharing b. logical topology