SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In business LANs - which connector is used w/ twisted-pair networking cable?
Window Size
A. show startup-config b. show running-config
RJ-45
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
2. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
80 (HTTP)
UDP
Router
Switch
3. What method of signal transmission uses radio waves to carry signals?
A. application b. services
Wireless
Logical Link Control sublayer
When connecting a host to a switch.
4. What are 2 common characteristics associated w/ dynamic routing protocols?
Minimal delays in data delivery.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
When connecting a host to a switch.
DNS
5. What is an automated service that matches resource names w/ required IP addresses?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
DNS
The address of the router that the host will use to 'get to the other side'.
6. Important characteristic of UDP
A. physical layer b. DLL layer
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Originate data flow.
Minimal delays in data delivery.
7. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
The packets will be delivered and reassembled at destination.
80 (HTTP)
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Destination is not contacted before a packet is sent.
8. What is the function of the DLL?
A. show startup-config b. show running-config
Source Port
It provides for the exchange of data over a common local media.
IP Protocol
9. If you have a small network w/ 3 computers...
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
0 to 1023
A. decentralized resources b. resource sharing w/o a dedicated server
Wireless
10. At which layer of the TCP/IP model does ethernet operate?
A. enable mode b. priviledge executive mode
Time-to-live (TTL)
A. Physical b. Data Link
Network Access
11. 3 primary functions of the data link layer encapsulation
Signal loss can be experienced.
A. addressing b. error detection c. frame delimiting
Network address
FTP
12. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
Router(config)# hostname Costas
Signal loss can be experienced.
The destination host address.
8
13. 3 facts about the network portion of an IPv4 address
Binary ANDing
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
14. What event occurs during the 3-way handshake?
TCP initializes the sequence numbers for the sessions.
A. goodput b. throughput c. bandwidth
To facilitate the entry and exit of data on media.
SSH
15. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Source and Destination Ports
Fiber
Hosts return to listen-before-transmit mode.
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
16. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
Flash
A physical topology.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
It provides interface between applications on either end of the network.
17. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
255.255.255.224
OTDR
No collisions will occur on this link.
Router(config)# hostname Costas
18. What is a characteristic of a logical point-to-point topology?
The MAC protocol can be very simple.
Flash
Switch
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
19. Why are port numbers included in the TCP header of a segment?
To enable a receiving host to forward the data to the appropriate application.
A. perform degradation b. security issues c. host identification
Create signals that represent the bits in each frame for the media.
Twisting of the cables
20. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
A. enable mode b. priviledge executive mode
MAC
A. servers b. routers c. network printers
Identify the device that allows local network computers to communicate w/ devices in other networks.
21. 2 characteristics of peer-2-peer
A. decentralized resources b. resource sharing w/o a dedicated server
32 bits
A. larger address space b. data types and classes of service c. authentication and encryption
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
22. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
A backbone cable.
The physical address is added.
Transport
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
23. Which 2 options represent Layer 4 addressing?
Network Layer
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
24. 2 characteristics of clients in data networks
A. they initiate data exchanges b. they may upload data to servers
Window Size
Collisions can decrease network performance.
Show Interfaces
25. Statements that describe LAN
Source and Destination Ports
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. HTTP b. HTTPS
A. not affected by EMI of RFI b. most expensive type of LAN cabling
26. What do end devices do?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Identify the device that allows local network computers to communicate w/ devices in other networks.
Source and Destination IP address
Originate data flow.
27. statements of IP adressing
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. netstat -r b. route PRINT
Minimal delays in data delivery.
Rollover cable
28. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
DNS
Host A
Network Layer
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
29. 3 measures of data transfer
No collisions will occur on this link.
Collisions can decrease network performance.
A. goodput b. throughput c. bandwidth
Any device whose backoff timer expires first.
30. What do the intermediary devices in the network do?
A. router b. firewall
A. hot keys b. context-sensitive c. command syntax check
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Console
31. What command can be used to determine if the router has experienced any input or output errors?
172.16.192.160
Host A
Show Interfaces
Router
32. 3 characteristics of valid Ethernet Layer 2 addresses
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. media sharing b. logical topology
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Show Interfaces
33. What can be a problem that is reduced by adding end-to-end addressing?
Minimal delays in data delivery.
A. it has centralized administration b. security is easier to enforce
DNS
It reduces unnecessary broadcasts.
34. If the router says: 'Switch-East4#' What identifies the CLI mode represented?
A. enable mode b. priviledge executive mode
A. minimizing of collisions b. division into broadcast domains
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
The physical address is added.
35. 3 functions of the upper data link sublayer in the OSI model
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Time-to-live (TTL)
Logical Link Control sublayer
Network Layer
36. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
8
2046
A. it has centralized administration b. security is easier to enforce
Network Access
37. What is a benefit of a WAN?
A random delay helps prevent the stations from experiencing another collision during transmission.
Network
Next-Hop Address
Host mobility
38. What is the primary purpose of Layer 4?
Switch
Identify processes or services that are communicating with end devices.
MAC
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
39. What networking devices are recommended to be assigned static IP addresses?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. performance degradation b. security issues c. host identification
A. servers b. routers c. network printers
Static
40. What is the primary reason for developing IPv6?
The MAC protocol can be very simple.
It has expanded adressing capabilities.
MAC
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
41. When destination network is not in the routing table - What are 2 actions the router might take?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
255.255.255.224
Network Media Control
42. When a network service fails - which port is most often used to access a router for management purposes?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Console
DNS
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
43. What is a disadvantage of Telnet?
Ctrl + Shift + 6
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
When connecting a host to a switch.
It does not support encryption.
44. What is the primary purpose of ARP?
A. perform degradation b. security issues c. host identification
Network
A. goodput b. throughput c. bandwidth
Resolve IPv4 addresses to MAC addresses.
45. 2 functions of encapsulation
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Collisions can decrease network performance.
Identify processes or services that are communicating with end devices.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
46. What statements describe the logical token-passing topology?
Supports error detection.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Time-to-live (TTL)
Rollover cable
47. What type of routing uses information that is manually entered into the routing table?
Is used by the server to resolve names.
A. servers b. routers c. network printers
Rollover cable
Static
48. Why is flow control used for TCP data transfer?
To prevent the receiver from being overwhelmed by incoming data.
A. application b. services
Console
A. perform degradation b. security issues c. host identification
49. What can get you to an outside network?
A default gateway (router).
8
A. goodput b. throughput c. bandwidth
A. application b. services
50. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
MAC
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device