SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are 3 properties of contention-based media access for a shared media?
255.255.255.0
Twisting of the cables
A. HTTP b. HTTPS
A. non-deterministic b. less overhead c. collisions exist
2. 2 features that make switches preferable to hubs
Wireless
SSH
A. minimizing of collisions b. division into broadcast domains
To facilitate the entry and exit of data on media.
3. If you have a full-duplex operational network - what can happen?
No collisions will occur on this link.
The MAC protocol can be very simple.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A random delay helps prevent the stations from experiencing another collision during transmission.
4. Statements that describe LAN
A. enable mode b. priviledge executive mode
Console interface
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
No collisions will occur on this link.
5. At which layer of the TCP/IP model does ethernet operate?
Network Access
255.255.255.224
8
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
6. What command can be used to determine if the router has experienced any input or output errors?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. show startup-config b. show running-config
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Show Interfaces
7. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
Network Access
A. copper UTP b. optical fiber
Application Layer
Supports error detection.
8. When destination network is not in the routing table - What are 2 actions the router might take?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. HTTP b. HTTPS
Resolve IPv4 addresses to MAC addresses.
A. addressing b. error detection c. frame delimiting
9. What networking devices are recommended to be assigned static IP addresses?
A. servers b. routers c. network printers
A. enable mode b. priviledge executive mode
Binary ANDing
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
10. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
A. DB 60 b. Winchester 15-pin c. smart serial
A. Physical b. Data Link
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
2046
11. What are 2 email components used to forward mail between servers?
A. MTA b. SMTP
RJ-45
A. larger address space b. data types and classes of service c. authentication and encryption
80 (HTTP)
12. An admin needs to keep contents private - which access method should he use?
Source and Destination IP address
A. netstat -r b. route PRINT
SSH
A. flow control b. session establishment c. numbering and sequencing
13. What is an automated service that matches resource names w/ required IP addresses?
DNS
Source and Destination Ports
SMB
A. next-hop b. metric/interface c. destination network address
14. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
Host A
Router(config)# hostname Costas
Destination is not contacted before a packet is sent.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
15. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
The packets will be delivered and reassembled at destination.
172.16.192.160
A. they initiate data exchanges b. they may upload data to servers
Destination Network Address
16. 3 functions of the upper data link sublayer in the OSI model
A. servers b. routers c. network printers
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
UTP
It does not support encryption.
17. 3 measures of data transfer
A. goodput b. throughput c. bandwidth
Network address
A physical topology.
0 to 1023
18. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
Rollover cable
UTP
A backbone cable.
TCP initializes the sequence numbers for the sessions.
19. What statements describe the logical token-passing topology?
MAC
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
UDP
Network
20. What can you identify when you examine the Network Layer header?
The destination host address.
Rollover cable
Is a layer of specific encapsulation.
Supports error detection.
21. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
A. MTA b. SMTP
Network Layer Packet
Router(config)# hostname Costas
A physical topology.
22. What is dinamically selected by the source host when forwarding data?
A. copper UTP b. optical fiber
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Source Port
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
23. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Rollover cable
IP is not properly installed
A. DNS b. SMTP c. POP
24. Why are port numbers included in the TCP header of a segment?
To enable a receiving host to forward the data to the appropriate application.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
25. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Fiber
Hosts return to listen-before-transmit mode.
Time-to-live (TTL)
2046
26. What does the IEEE 802.2 standard represent in Ethernet technologies?
A. decentralized resources b. resource sharing w/o a dedicated server
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Network address
Logical Link Control sublayer
27. When a device is moved from one network to the other...?
0 to 1023
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
The MAC protocol can be very simple.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
28. What is a drawback of the CSMA/CD access method?
Collisions can decrease network performance.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
The magnetic field around the adjacent pairs of wire.
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
29. 3 characteristics of valid Ethernet Layer 2 addresses
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
SSH
The address of the router that the host will use to 'get to the other side'.
30. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
255.255.255.224
A. non-deterministic b. less overhead c. collisions exist
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Identify processes or services that are communicating with end devices.
31. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
A. flow control b. session establishment c. numbering and sequencing
A. perform degradation b. security issues c. host identification
Physical
Binary ANDing
32. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
2046
Supports error detection.
It uses support from the lower layers to distinguish between connections to the service.
Transport
33. Important characteristic of UDP
Identify processes or services that are communicating with end devices.
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Minimal delays in data delivery.
A physical topology.
34. 3 common problems w/ a large network
Static
They must wait until the first hosts finish transfering the media.
To enable a receiving host to forward the data to the appropriate application.
A. performance degradation b. security issues c. host identification
35. When is a straight-through cable used in a network?
A. addressing b. error detection c. frame delimiting
When connecting a host to a switch.
0 to 1023
Host A
36. What is the primary reason for developing IPv6?
SMB
A. application b. presentation c. session d. transmision e. network f. data link g. physical
It has expanded adressing capabilities.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
37. Which device is used to create or divide broadcast domains?
It does not support encryption.
FTP
Router
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
38. What are 3 common problems w/ large networks?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. perform degradation b. security issues c. host identification
OTDR
A. identifies the communicating applications b. identifies multiple conversations between the hosts
39. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
2046
No collisions will occur on this link.
40. Network Protocols
A. performance degradation b. security issues c. host identification
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A physical topology.
A. show startup-config b. show running-config
41. 3 protocols that operate in the application layer
A. DNS b. SMTP c. POP
Wireless
Identify processes or services that are communicating with end devices.
A. next-hop b. metric/interface c. destination network address
42. 3 primary functions of the data link layer encapsulation
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. addressing b. error detection c. frame delimiting
The physical address is added.
Host A
43. Which portion of the network layer address does a router use to forward packets?
A. addressing b. error detection c. frame delimiting
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Network portion
A. physical layer b. DLL layer
44. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
MAC
It does not support encryption.
Console
The MAC protocol can be very simple.
45. 3 features that allow TCP to realibly and accurately track the transmission of data
IP is not properly installed
A. flow control b. session establishment c. numbering and sequencing
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
46. What is an effect of improperly applying a network cable connector?
Console interface
A. addressing b. error detection c. frame delimiting
Create signals that represent the bits in each frame for the media.
Signal loss can be experienced.
47. 3 factors that should be considered when implementing Layer 2 protocols
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Network
A. replace a switch w/ a router b. subnet the new networks
The destination host address.
48. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
It does not support encryption.
When connecting a host to a switch.
A. show startup-config b. show running-config
A. they initiate data exchanges b. they may upload data to servers
49. What type of network cable is used between a terminal and a console port?
Rollover cable
Transport
Hub
UTP
50. What is a component of a routing table entry?
Host mobility
Next-Hop Address
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long