SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the purpose of a default gateway?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. physical layer b. DLL layer
A. copper UTP b. optical fiber
Identify the device that allows local network computers to communicate w/ devices in other networks.
2. What correctly describes a MAC address?
Originate data flow.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
3. What is the purpose of resource records in DNS?
Binary ANDing
Is used by the server to resolve names.
Transport
Identify the device that allows local network computers to communicate w/ devices in other networks.
4. 3 statements about the role of routers in the network
Identify processes or services that are communicating with end devices.
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
5. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
80 (HTTP)
A default gateway (router).
A. they initiate data exchanges b. they may upload data to servers
It has expanded adressing capabilities.
6. statements of IP adressing
A. enable mode b. priviledge executive mode
255.255.255.0
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. performance degradation b. security issues c. host identification
7. What networking devices are recommended to be assigned static IP addresses?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. servers b. routers c. network printers
Physical
8. Default Gateway is incorrect on the host - What is the impact on the communications?
It reduces unnecessary broadcasts.
UDP
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Any device whose backoff timer expires first.
9. 3 protocols that operate in the application layer
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. DNS b. SMTP c. POP
A. enable mode b. priviledge executive mode
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
10. What are key considering factors when grouping hosts into common networks?
A. purpose b. geographic location c. ownership
DNS
To enable a receiving host to forward the data to the appropriate application.
A. replace a switch w/ a router b. subnet the new networks
11. 3 properties of peer-2-peer applications
The destination host address.
It uses lasers as the light source.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. router b. firewall
12. What can be a problem that is reduced by adding end-to-end addressing?
A. larger address space b. data types and classes of service c. authentication and encryption
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
It reduces unnecessary broadcasts.
To prevent the receiver from being overwhelmed by incoming data.
13. Which IP packet field will prevent endless loops?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Network Layer Packet
Minimal delays in data delivery.
Time-to-live (TTL)
14. What 2 type of cables would most commonly be used for new runs?
A. addressing b. error detection c. frame delimiting
A. Cat5 UTP b. Cat6 UTP
The packets will be delivered and reassembled at destination.
A. MTA b. SMTP
15. What are 2 common characteristics associated w/ dynamic routing protocols?
The address of the router that the host will use to 'get to the other side'.
Application Layer
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. larger address space b. data types and classes of service c. authentication and encryption
16. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. What command can be used to determine if the router has experienced any input or output errors?
It does not support encryption.
FTP
Show Interfaces
DNS
18. How many bits make up an IPv4 address?
A default gateway (router).
Destination Network Address
32 bits
Host A
19. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
32 bits
UDP
It uses lasers as the light source.
It uses support from the lower layers to distinguish between connections to the service.
20. 3 terms that define the forms of help available within the Cisco IOS
Host mobility
255.255.255.224
2046
A. hot keys b. context-sensitive c. command syntax check
21. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. media sharing b. logical topology
A. Physical b. Data Link
22. 3 features that allow TCP to realibly and accurately track the transmission of data
A. perform degradation b. security issues c. host identification
TCP initializes the sequence numbers for the sessions.
A. flow control b. session establishment c. numbering and sequencing
Network portion
23. What is the primary purpose of Layer 4?
A physical topology.
Is a layer of specific encapsulation.
Hub
Identify processes or services that are communicating with end devices.
24. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
MAC
IP is not properly installed
Static
Fiber
25. In business LANs - which connector is used w/ twisted-pair networking cable?
A. minimizing of collisions b. division into broadcast domains
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Network
RJ-45
26. What is the primary reason for developing IPv6?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A physical topology.
Application Layer
It has expanded adressing capabilities.
27. At which layers of the OSI model does ethernet operate?
A. netstat -r b. route PRINT
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. physical layer b. DLL layer
It uses support from the lower layers to distinguish between connections to the service.
28. What are 2 email components used to forward mail between servers?
It uses lasers as the light source.
Source Port
Any device whose backoff timer expires first.
A. MTA b. SMTP
29. 2 functions of encapsulation
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Network address
A. MTA b. SMTP
Identify processes or services that are communicating with end devices.
30. What kind of problems are caused by excessive broadcast traffic on network segments?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Network Access
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
31. Which 2 options represent Layer 4 addressing?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Signal loss can be experienced.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
32. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
SMB
UTP
8
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
33. During encapsulation - what happens in the Data Link Layer?
Hub
Physical
A. purpose b. geographic location c. ownership
The physical address is added.
34. What is the purpose of the TCP/IP Network Application Layer?
Identify processes or services that are communicating with end devices.
Network Media Control
Resolve IPv4 addresses to MAC addresses.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
35. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. perform degradation b. security issues c. host identification
The MAC protocol can be very simple.
SMB
Network Layer Packet
36. What are the advantages of using a client-server model?
A. it has centralized administration b. security is easier to enforce
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
SMB
RJ-45
37. Why is flow control used for TCP data transfer?
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
To prevent the receiver from being overwhelmed by incoming data.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A default gateway (router).
38. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. application b. services
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
39. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. DB 60 b. Winchester 15-pin c. smart serial
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Destination is not contacted before a packet is sent.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
40. When a device is moved from one network to the other...?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
IP is not properly installed
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. goodput b. throughput c. bandwidth
41. Where is the IOS file stored at?
Transport
Flash
Static
Router
42. What is dinamically selected by the source host when forwarding data?
SMB
Host mobility
Source Port
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
43. What is a characteristic of a logical point-to-point topology?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
The MAC protocol can be very simple.
A. larger address space b. data types and classes of service c. authentication and encryption
A. HTTP b. HTTPS
44. If you have a small network w/ 3 computers...
Any device whose backoff timer expires first.
A. netstat -r b. route PRINT
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Destination is not contacted before a packet is sent.
45. An admin needs to keep contents private - which access method should he use?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. they initiate data exchanges b. they may upload data to servers
The magnetic field around the adjacent pairs of wire.
SSH
46. What information is added during encapsulation at OSI Layer 3?
Next-Hop Address
Originate data flow.
A. performance degradation b. security issues c. host identification
Source and Destination IP address
47. What determines the method of media access control?
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. media sharing b. logical topology
Show Interfaces
48. 3 measures of data transfer
A. copper UTP b. optical fiber
A. goodput b. throughput c. bandwidth
Destination Network Address
Console
49. There are too many broadcasts on switches - what can be done?
A. replace a switch w/ a router b. subnet the new networks
Binary ANDing
Show Interfaces
255.255.255.0
50. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
A. DNS b. SMTP c. POP
Router(config)# interface FastEthernet 0/1
Logical Link Control sublayer
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry