SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When destination network is not in the routing table - What are 2 actions the router might take?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Switch
32 bits
2. Default Gateway is incorrect on the host - What is the impact on the communications?
Originate data flow.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
80 (HTTP)
The packets will be delivered and reassembled at destination.
3. 2 functions of encapsulation
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. media sharing b. logical topology
IP is not properly installed
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
4. 2 features that make switches preferable to hubs
A. minimizing of collisions b. division into broadcast domains
Is used by the server to resolve names.
Source Port
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
5. Where is the IOS file stored at?
A. show startup-config b. show running-config
The physical address is added.
The address of the router that the host will use to 'get to the other side'.
Flash
6. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
80 (HTTP)
Identify processes or services that are communicating with end devices.
DNS
IP is not properly installed
7. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. Cat5 UTP b. Cat6 UTP
0 to 1023
To prevent the receiver from being overwhelmed by incoming data.
SMB
8. What are key considering factors when grouping hosts into common networks?
A. flow control b. session establishment c. numbering and sequencing
The physical address is added.
A. purpose b. geographic location c. ownership
Rollover cable
9. What are 3 common problems w/ large networks?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
To enable a receiving host to forward the data to the appropriate application.
Host mobility
A. perform degradation b. security issues c. host identification
10. What statements describe the logical token-passing topology?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. router b. firewall
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. the router will discard the packet b. the router will send a time exceeded message to the source host
11. 3 functions of the upper data link sublayer in the OSI model
Console interface
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Window Size
Static
12. When a device is moved from one network to the other...?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
255.255.255.224
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Network Access
13. 2 most commonly used media types in ethernet networks
As the commands are entered.
A. hot keys b. context-sensitive c. command syntax check
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. copper UTP b. optical fiber
14. What is the purpose of resource records in DNS?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Is used by the server to resolve names.
0 to 1023
The physical address is added.
15. How does the application layer on a server process multiple client requests for services?
A. Physical b. Data Link
It uses support from the lower layers to distinguish between connections to the service.
Hosts return to listen-before-transmit mode.
Network Layer
16. Which combination of keys can be used to interrupt a ping or traceroute process?
To facilitate the entry and exit of data on media.
Ctrl + Shift + 6
A. HTTP b. HTTPS
DNS
17. What are 3 properties of contention-based media access for a shared media?
Binary ANDing
Network Layer
A. media sharing b. logical topology
A. non-deterministic b. less overhead c. collisions exist
18. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. servers b. routers c. network printers
They must wait until the first hosts finish transfering the media.
Hub
19. What makes fiber preferable to copper for interconnecting buildings?
A. MTA b. SMTP
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
20. What is the primary rope of the physical layer in transmitting data?
Create signals that represent the bits in each frame for the media.
A. they initiate data exchanges b. they may upload data to servers
A. Cat5 UTP b. Cat6 UTP
Logical Link Control sublayer
21. Why is flow control used for TCP data transfer?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
The physical address is added.
To prevent the receiver from being overwhelmed by incoming data.
22. 3 terms that define the forms of help available within the Cisco IOS
A physical topology.
A. copper UTP b. optical fiber
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. hot keys b. context-sensitive c. command syntax check
23. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
A. addressing b. error detection c. frame delimiting
2046
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Any device whose backoff timer expires first.
24. What are 2 forms of application layer software?
A. Cat5 UTP b. Cat6 UTP
A. application b. services
SMB
Resolve IPv4 addresses to MAC addresses.
25. 2 characteristics of peer-2-peer
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. decentralized resources b. resource sharing w/o a dedicated server
A backbone cable.
26. What are 2 commands used to view a host routing table?
It uses lasers as the light source.
A. netstat -r b. route PRINT
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
27. What layer encapsulates segments into packets?
Network Layer Packet
A. next-hop b. metric/interface c. destination network address
Network Layer
Destination is not contacted before a packet is sent.
28. What are 2 email components used to forward mail between servers?
Source and Destination Ports
A. MTA b. SMTP
A. router b. firewall
A. identifies the communicating applications b. identifies multiple conversations between the hosts
29. At which layers of the OSI model does ethernet operate?
A. physical layer b. DLL layer
A. copper UTP b. optical fiber
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
30. Network Protocols
OTDR
DNS
A. MTA b. SMTP
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
31. What is the primary purpose of Layer 4?
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Static
Identify processes or services that are communicating with end devices.
32. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
MAC
Network Layer
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Network portion
33. Important characteristic of UDP
A. servers b. routers c. network printers
Minimal delays in data delivery.
Router
A. it has centralized administration b. security is easier to enforce
34. 3 measures of data transfer
SMB
Network address
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. goodput b. throughput c. bandwidth
35. What is PDU?
Is a layer of specific encapsulation.
Hosts return to listen-before-transmit mode.
A default gateway (router).
Router(config)# interface FastEthernet 0/1
36. Intermediary devices used to implement security between networks
Network address
A. addressing b. error detection c. frame delimiting
Signal loss can be experienced.
A. router b. firewall
37. What describes the purpose of default route?
Static
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Is a layer of specific encapsulation.
Next-Hop Address
38. At which layer of the TCP/IP model does ethernet operate?
DNS
Network Access
MAC
When connecting a host to a switch.
39. 3 common problems w/ a large network
A. minimizing of collisions b. division into broadcast domains
A. performance degradation b. security issues c. host identification
SMB
No collisions will occur on this link.
40. 3 protocols that operate in the application layer
A. Physical b. Data Link
Fiber
A. DNS b. SMTP c. POP
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
41. Statements that describe LAN
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. low overhead b. connectionless
A default gateway (router).
UDP
42. What is a component of a routing table entry?
Next-Hop Address
A. DB 60 b. Winchester 15-pin c. smart serial
It provides interface between applications on either end of the network.
A physical topology.
43. What can you identify when you examine the Network Layer header?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
The destination host address.
Router
A. goodput b. throughput c. bandwidth
44. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
Window Size
The physical address is added.
To prevent the receiver from being overwhelmed by incoming data.
A. it has centralized administration b. security is easier to enforce
45. Which device is used to create or divide broadcast domains?
Host mobility
Router
Physical
MAC
46. What are 2 features of User Diagram Protocol (UDP)?
A. low overhead b. connectionless
Fiber
Hub
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
47. Which IP packet field will prevent endless loops?
A. Cat5 UTP b. Cat6 UTP
A. performance degradation b. security issues c. host identification
Router(config)# hostname Costas
Time-to-live (TTL)
48. If you have a full-duplex operational network - what can happen?
Resolve IPv4 addresses to MAC addresses.
Flash
No collisions will occur on this link.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
49. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Twisting of the cables
172.16.192.160
50. What correctly describes a MAC address?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Host mobility