SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What causes crosstalk within cable pairs when using UTP?
When connecting a host to a switch.
32 bits
The magnetic field around the adjacent pairs of wire.
Hosts return to listen-before-transmit mode.
2. 3 common problems w/ a large network
Window Size
Network portion
A. performance degradation b. security issues c. host identification
A random delay helps prevent the stations from experiencing another collision during transmission.
3. What can be a problem that is reduced by adding end-to-end addressing?
It reduces unnecessary broadcasts.
Next-Hop Address
A. HTTP b. HTTPS
Rollover cable
4. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
They must wait until the first hosts finish transfering the media.
A. MTA b. SMTP
It does not support encryption.
Ctrl + Shift + 6
5. What is the purpose of the preamble in an ethernet frame?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Window Size
Source Port
172.16.192.160
6. During a TCP session - if packets arrive out of order - what will happen?
Rollover cable
The packets will be delivered and reassembled at destination.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
SSH
7. 3 statements about the role of routers in the network
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
8. 3 protocols that operate in the application layer
It provides interface between applications on either end of the network.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. DNS b. SMTP c. POP
9. Intermediary devices used to implement security between networks
Network Layer
A. router b. firewall
Twisting of the cables
A default gateway (router).
10. What is the primary purpose of ARP?
Host mobility
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Resolve IPv4 addresses to MAC addresses.
Physical
11. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
A physical topology.
2046
Window Size
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
12. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
A. flow control b. session establishment c. numbering and sequencing
Router(config)# interface FastEthernet 0/1
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Hosts return to listen-before-transmit mode.
13. What is a component of a routing table entry?
Host A
Twisting of the cables
A. decentralized resources b. resource sharing w/o a dedicated server
Next-Hop Address
14. What layer encapsulates segments into packets?
Twisting of the cables
It uses support from the lower layers to distinguish between connections to the service.
Network Layer
Rollover cable
15. What event occurs during the 3-way handshake?
It provides for the exchange of data over a common local media.
TCP initializes the sequence numbers for the sessions.
A. application b. services
The address of the router that the host will use to 'get to the other side'.
16. What is the primary purpose of Layer 4?
Identify processes or services that are communicating with end devices.
Network
A. decentralized resources b. resource sharing w/o a dedicated server
Is a layer of specific encapsulation.
17. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
Binary ANDing
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Transport
Router(config)# hostname Costas
18. What command can be used to determine if the router has experienced any input or output errors?
Originate data flow.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Hosts return to listen-before-transmit mode.
Show Interfaces
19. What are 2 features of User Diagram Protocol (UDP)?
A. low overhead b. connectionless
255.255.255.0
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Hosts return to listen-before-transmit mode.
20. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
Network address
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
255.255.255.224
Router
21. What are key considering factors when grouping hosts into common networks?
Console interface
A. DB 60 b. Winchester 15-pin c. smart serial
A. low overhead b. connectionless
A. purpose b. geographic location c. ownership
22. 3 properties of peer-2-peer applications
A. enable mode b. priviledge executive mode
Time-to-live (TTL)
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
23. Statements that describe LAN
Create signals that represent the bits in each frame for the media.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
24. What is the role of MTA in handling email?
A. netstat -r b. route PRINT
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. non-deterministic b. less overhead c. collisions exist
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
25. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
Network Media Control
2046
A. minimizing of collisions b. division into broadcast domains
Next-Hop Address
26. What can you identify when you examine the Network Layer header?
The destination host address.
It uses lasers as the light source.
Source and Destination Ports
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
27. 2 features that make switches preferable to hubs
A physical topology.
A. minimizing of collisions b. division into broadcast domains
255.255.255.224
A. larger address space b. data types and classes of service c. authentication and encryption
28. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
A. show startup-config b. show running-config
255.255.255.224
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. Cat5 UTP b. Cat6 UTP
29. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
Host A
Static
No collisions will occur on this link.
Application Layer
30. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. router b. firewall
A. larger address space b. data types and classes of service c. authentication and encryption
A. they initiate data exchanges b. they may upload data to servers
31. What is dinamically selected by the source host when forwarding data?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. minimizing of collisions b. division into broadcast domains
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Source Port
32. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
A. minimizing of collisions b. division into broadcast domains
0 to 1023
Hosts return to listen-before-transmit mode.
A. next-hop b. metric/interface c. destination network address
33. When destination network is not in the routing table - What are 2 actions the router might take?
SSH
It uses lasers as the light source.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
34. What do end devices do?
They must wait until the first hosts finish transfering the media.
Originate data flow.
The physical address is added.
Router(config)# hostname Costas
35. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
As the commands are entered.
172.16.192.160
A. application b. presentation c. session d. transmision e. network f. data link g. physical
0 to 1023
36. What is the primary rope of the physical layer in transmitting data?
Create signals that represent the bits in each frame for the media.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Console
A. performance degradation b. security issues c. host identification
37. What is a characteristic of a logical point-to-point topology?
TCP initializes the sequence numbers for the sessions.
The MAC protocol can be very simple.
Network Access
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
38. What makes fiber preferable to copper for interconnecting buildings?
Host A
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Router
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
39. Default Gateway is incorrect on the host - What is the impact on the communications?
Physical
A. larger address space b. data types and classes of service c. authentication and encryption
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Wireless
40. What is the purpose of resource records in DNS?
A. MTA b. SMTP
Binary ANDing
A. servers b. routers c. network printers
Is used by the server to resolve names.
41. What is a drawback of the CSMA/CD access method?
Any device whose backoff timer expires first.
Rollover cable
Collisions can decrease network performance.
Wireless
42. Which device is used to create or divide broadcast domains?
SMB
RJ-45
Router
Is a layer of specific encapsulation.
43. What is the primary reason for developing IPv6?
Identify the device that allows local network computers to communicate w/ devices in other networks.
Create signals that represent the bits in each frame for the media.
Switch
It has expanded adressing capabilities.
44. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
Transport
A random delay helps prevent the stations from experiencing another collision during transmission.
The destination host address.
Resolve IPv4 addresses to MAC addresses.
45. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
A. goodput b. throughput c. bandwidth
MAC
A. enable mode b. priviledge executive mode
A. larger address space b. data types and classes of service c. authentication and encryption
46. What type of routing uses information that is manually entered into the routing table?
Application Layer
Host A
It uses lasers as the light source.
Static
47. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. What is the purpose of the TCP/IP Network Application Layer?
Transport
Network Media Control
To prevent the receiver from being overwhelmed by incoming data.
SSH
49. What type of network cable is used between a terminal and a console port?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. router b. firewall
Hosts return to listen-before-transmit mode.
Rollover cable
50. Why is flow control used for TCP data transfer?
A. DB 60 b. Winchester 15-pin c. smart serial
To prevent the receiver from being overwhelmed by incoming data.
DNS
Application Layer