SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. During encapsulation - what happens in the Data Link Layer?
The physical address is added.
Time-to-live (TTL)
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Identify the device that allows local network computers to communicate w/ devices in other networks.
2. Intermediary devices used to implement security between networks
Network address
Window Size
A. router b. firewall
The address of the router that the host will use to 'get to the other side'.
3. Why are port numbers included in the TCP header of a segment?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
To enable a receiving host to forward the data to the appropriate application.
A. they initiate data exchanges b. they may upload data to servers
4. What does the IEEE 802.2 standard represent in Ethernet technologies?
IP Protocol
A. MTA b. SMTP
It provides interface between applications on either end of the network.
Logical Link Control sublayer
5. 3 common problems w/ a large network
Console
Router(config)# hostname Costas
A. performance degradation b. security issues c. host identification
SSH
6. 3 factors that should be considered when implementing Layer 2 protocols
It has expanded adressing capabilities.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Binary ANDing
7. 3 facts about the network portion of an IPv4 address
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. Physical b. Data Link
Network address
8. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
Console interface
Transport
The physical address is added.
They must wait until the first hosts finish transfering the media.
9. On a ethernet segment - why do hosts that experience a collision use a random delay before attempting to transmit?
It reduces unnecessary broadcasts.
The magnetic field around the adjacent pairs of wire.
A random delay helps prevent the stations from experiencing another collision during transmission.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
10. 3 characteristics of valid Ethernet Layer 2 addresses
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A physical topology.
Router(config)# hostname Costas
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
11. What is the purpose of the preamble in an ethernet frame?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Host mobility
Transport
A. DB 60 b. Winchester 15-pin c. smart serial
12. 2 characteristics of peer-2-peer
A. decentralized resources b. resource sharing w/o a dedicated server
The destination host address.
SMB
A. application b. presentation c. session d. transmision e. network f. data link g. physical
13. 3 protocols that operate in the application layer
Console interface
TCP initializes the sequence numbers for the sessions.
UDP
A. DNS b. SMTP c. POP
14. Where is the IOS file stored at?
Minimal delays in data delivery.
A. show startup-config b. show running-config
A. performance degradation b. security issues c. host identification
Flash
15. When is a straight-through cable used in a network?
A. addressing b. error detection c. frame delimiting
A. servers b. routers c. network printers
When connecting a host to a switch.
A. DB 60 b. Winchester 15-pin c. smart serial
16. Which characteristics describe fiber optic cable?
A random delay helps prevent the stations from experiencing another collision during transmission.
A physical topology.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. larger address space b. data types and classes of service c. authentication and encryption
17. 3 statements about routes and their use
Hub
Ctrl + Shift + 6
A. DB 60 b. Winchester 15-pin c. smart serial
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
18. Which 2 options represent Layer 4 addressing?
Supports error detection.
SSH
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. identifies the communicating applications b. identifies multiple conversations between the hosts
19. What is the purpose of a default gateway?
Next-Hop Address
Minimal delays in data delivery.
Identify the device that allows local network computers to communicate w/ devices in other networks.
IP is not properly installed
20. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
A. perform degradation b. security issues c. host identification
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
80 (HTTP)
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
21. What is the primary purpose of ARP?
To facilitate the entry and exit of data on media.
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Resolve IPv4 addresses to MAC addresses.
It reduces unnecessary broadcasts.
22. How many bits make up an IPv4 address?
32 bits
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Destination Network Address
23. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. non-deterministic b. less overhead c. collisions exist
A. MTA b. SMTP
24. What characteristic of an UTP helps reduce interference?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. purpose b. geographic location c. ownership
Twisting of the cables
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
25. What are key considering factors when grouping hosts into common networks?
Console interface
To prevent the receiver from being overwhelmed by incoming data.
A. purpose b. geographic location c. ownership
A backbone cable.
26. At which layers of the OSI model does ethernet operate?
Network Layer Packet
A. next-hop b. metric/interface c. destination network address
Resolve IPv4 addresses to MAC addresses.
A. physical layer b. DLL layer
27. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
Logical Link Control sublayer
Hub
TCP initializes the sequence numbers for the sessions.
A. purpose b. geographic location c. ownership
28. In business LANs - which connector is used w/ twisted-pair networking cable?
UTP
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
MAC
RJ-45
29. 3 functions of the upper data link sublayer in the OSI model
172.16.192.160
Binary ANDing
A physical topology.
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
30. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
It uses lasers as the light source.
Physical
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Window Size
31. What can get you to an outside network?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A default gateway (router).
32. Which layer supplies services and allows user interface?
Application Layer
Network Layer
Network portion
A. physical layer b. DLL layer
33. What is an automated service that matches resource names w/ required IP addresses?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Supports error detection.
DNS
255.255.255.224
34. During a TCP session - if packets arrive out of order - what will happen?
Router(config)# interface FastEthernet 0/1
Identify processes or services that are communicating with end devices.
A. goodput b. throughput c. bandwidth
The packets will be delivered and reassembled at destination.
35. What command can be used to determine if the router has experienced any input or output errors?
A. perform degradation b. security issues c. host identification
They must wait until the first hosts finish transfering the media.
A default gateway (router).
Show Interfaces
36. Which combination of keys can be used to interrupt a ping or traceroute process?
They must wait until the first hosts finish transfering the media.
A. show startup-config b. show running-config
Ctrl + Shift + 6
Switch
37. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
OTDR
UTP
Network address
The magnetic field around the adjacent pairs of wire.
38. What are 3 common problems w/ large networks?
A. perform degradation b. security issues c. host identification
Network Media Control
Network Layer Packet
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
39. What device can check for faults - integrity and performance of media?
Console interface
OTDR
IP Protocol
Logical Link Control sublayer
40. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
0 to 1023
A. Physical b. Data Link
Fiber
A. hot keys b. context-sensitive c. command syntax check
41. What information is added during encapsulation at OSI Layer 3?
Source and Destination IP address
A. enable mode b. priviledge executive mode
Flash
A. HTTP b. HTTPS
42. What layer encapsulates segments into packets?
Signal loss can be experienced.
A. addressing b. error detection c. frame delimiting
A physical topology.
Network Layer
43. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. Physical b. Data Link
It provides interface between applications on either end of the network.
A. larger address space b. data types and classes of service c. authentication and encryption
44. There are too many broadcasts on switches - what can be done?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Network address
A. replace a switch w/ a router b. subnet the new networks
45. What command is used to change the default name to 'Costas'?
Create signals that represent the bits in each frame for the media.
A default gateway (router).
172.16.192.160
Router(config)# hostname Costas
46. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
IP is not properly installed
When connecting a host to a switch.
Supports error detection.
Binary ANDing
47. statements of IP adressing
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Twisting of the cables
Source and Destination Ports
It reduces unnecessary broadcasts.
48. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
A. Physical b. Data Link
The physical address is added.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
49. What are 2 forms of application layer software?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
No collisions will occur on this link.
A. application b. services
Hub
50. What are the advantages of using a client-server model?
A. it has centralized administration b. security is easier to enforce
A. replace a switch w/ a router b. subnet the new networks
0 to 1023
A. hot keys b. context-sensitive c. command syntax check