SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 3 statements about routes and their use
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. Cat5 UTP b. Cat6 UTP
Fiber
Network Access
2. What does the IEEE 802.2 standard represent in Ethernet technologies?
A backbone cable.
Host A
A. enable mode b. priviledge executive mode
Logical Link Control sublayer
3. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
The MAC protocol can be very simple.
UDP
Router
Network Media Control
4. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
The magnetic field around the adjacent pairs of wire.
A. router b. firewall
Hub
It provides interface between applications on either end of the network.
5. What is the primary reason for developing IPv6?
A. show startup-config b. show running-config
It has expanded adressing capabilities.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
0 to 1023
6. Why are port numbers included in the TCP header of a segment?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
To enable a receiving host to forward the data to the appropriate application.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
7. Which combination of keys can be used to interrupt a ping or traceroute process?
Ctrl + Shift + 6
The destination host address.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
MAC
8. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
255.255.255.224
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Console interface
Rollover cable
9. Which portion of the network layer address does a router use to forward packets?
0 to 1023
Console
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Network portion
10. What statements describe the logical token-passing topology?
A random delay helps prevent the stations from experiencing another collision during transmission.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Twisting of the cables
11. Important characteristic of UDP
The address of the router that the host will use to 'get to the other side'.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Minimal delays in data delivery.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
12. There are too many broadcasts on switches - what can be done?
UDP
It provides for the exchange of data over a common local media.
0 to 1023
A. replace a switch w/ a router b. subnet the new networks
13. What determines the method of media access control?
UDP
Is used by the server to resolve names.
A. media sharing b. logical topology
Network Layer Packet
14. When a network service fails - which port is most often used to access a router for management purposes?
Host A
It uses lasers as the light source.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Console
15. Which 2 options represent Layer 4 addressing?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. performance degradation b. security issues c. host identification
Network address
Logical Link Control sublayer
16. What causes crosstalk within cable pairs when using UTP?
The magnetic field around the adjacent pairs of wire.
Destination Network Address
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
17. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. What information is added during encapsulation at OSI Layer 3?
Source and Destination IP address
255.255.255.224
A. they initiate data exchanges b. they may upload data to servers
A. MTA b. SMTP
19. What is the proper order of the OSI Layers?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. purpose b. geographic location c. ownership
20. 3 features of IPv6
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. larger address space b. data types and classes of service c. authentication and encryption
OTDR
Supports error detection.
21. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Static
A default gateway (router).
Physical
22. An admin needs to keep contents private - which access method should he use?
SSH
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Physical
A. router b. firewall
23. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
To prevent the receiver from being overwhelmed by incoming data.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A backbone cable.
Fiber
24. 3 statements of media acess control
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. HTTP b. HTTPS
To prevent the receiver from being overwhelmed by incoming data.
25. 3 factors that should be considered when implementing Layer 2 protocols
A. flow control b. session establishment c. numbering and sequencing
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Network Layer
To prevent the receiver from being overwhelmed by incoming data.
26. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Resolve IPv4 addresses to MAC addresses.
172.16.192.160
RJ-45
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
27. If there is a graphic representation of a company network wiring and equipment - What is this called?
Time-to-live (TTL)
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A physical topology.
0 to 1023
28. What layer encapsulates segments into packets?
Network Layer
It does not support encryption.
A. router b. firewall
Signal loss can be experienced.
29. What is the purpose of resource records in DNS?
Transport
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Is used by the server to resolve names.
The destination host address.
30. What are 2 features of User Diagram Protocol (UDP)?
A. low overhead b. connectionless
IP is not properly installed
Signal loss can be experienced.
Network portion
31. What are the advantages of using a client-server model?
A. low overhead b. connectionless
A. it has centralized administration b. security is easier to enforce
No collisions will occur on this link.
UTP
32. When do changes take effect in a Cisco router?
255.255.255.224
No collisions will occur on this link.
As the commands are entered.
SMB
33. What is a drawback of the CSMA/CD access method?
Network address
Collisions can decrease network performance.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
As the commands are entered.
34. Statements that describe LAN
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
32 bits
Source and Destination IP address
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
35. What characteristic of an UTP helps reduce interference?
A. minimizing of collisions b. division into broadcast domains
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Twisting of the cables
A. decentralized resources b. resource sharing w/o a dedicated server
36. 3 features that allow TCP to realibly and accurately track the transmission of data
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. next-hop b. metric/interface c. destination network address
A. flow control b. session establishment c. numbering and sequencing
UTP
37. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
A. show startup-config b. show running-config
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
To prevent the receiver from being overwhelmed by incoming data.
Supports error detection.
38. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
Fiber
Ctrl + Shift + 6
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. show startup-config b. show running-config
39. What is a characteristic of a logical point-to-point topology?
DNS
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
The MAC protocol can be very simple.
8
40. What are 2 forms of application layer software?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. application b. services
41. What are 2 commands used to view a host routing table?
The address of the router that the host will use to 'get to the other side'.
A. netstat -r b. route PRINT
A. decentralized resources b. resource sharing w/o a dedicated server
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
42. What is the primary purpose of ARP?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Hosts return to listen-before-transmit mode.
A. perform degradation b. security issues c. host identification
Resolve IPv4 addresses to MAC addresses.
43. What is the purpose of the TCP/IP Network Application Layer?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
80 (HTTP)
Network Access
Network Media Control
44. 3 functions of the upper data link sublayer in the OSI model
A. decentralized resources b. resource sharing w/o a dedicated server
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
0 to 1023
Ctrl + Shift + 6
45. What are 2 common characteristics associated w/ dynamic routing protocols?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
UTP
MAC
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
46. What can be a problem that is reduced by adding end-to-end addressing?
It provides interface between applications on either end of the network.
Next-Hop Address
It reduces unnecessary broadcasts.
8
47. What type of routing uses information that is manually entered into the routing table?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Static
32 bits
48. What is the primary function of encapsulating packets into frames?
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Network portion
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
To facilitate the entry and exit of data on media.
49. What describes the purpose of default route?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Network address
50. What are 3 common problems w/ large networks?
Signal loss can be experienced.
A. perform degradation b. security issues c. host identification
It uses lasers as the light source.
Network address