SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a disadvantage of Telnet?
A. flow control b. session establishment c. numbering and sequencing
80 (HTTP)
It does not support encryption.
It uses support from the lower layers to distinguish between connections to the service.
2. If the router says: 'Switch-East4#' What identifies the CLI mode represented?
A. physical layer b. DLL layer
A. hot keys b. context-sensitive c. command syntax check
Time-to-live (TTL)
A. enable mode b. priviledge executive mode
3. Which device is used to create or divide broadcast domains?
A. minimizing of collisions b. division into broadcast domains
A default gateway (router).
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Router
4. Intermediary devices used to implement security between networks
A. router b. firewall
Destination is not contacted before a packet is sent.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A physical topology.
5. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
32 bits
It provides for the exchange of data over a common local media.
2046
6. What information is added during encapsulation at OSI Layer 3?
A. media sharing b. logical topology
Source and Destination IP address
A. decentralized resources b. resource sharing w/o a dedicated server
Network Layer
7. What info is found in the TCP and UDP header info?
A. performance degradation b. security issues c. host identification
A. minimizing of collisions b. division into broadcast domains
A. replace a switch w/ a router b. subnet the new networks
Source and Destination Ports
8. 3 facts about the network portion of an IPv4 address
Host mobility
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Rollover cable
OTDR
9. What is the primary reason for developing IPv6?
SMB
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
It has expanded adressing capabilities.
10. 3 properties of peer-2-peer applications
2046
A. low overhead b. connectionless
Originate data flow.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
11. What is the primary function of encapsulating packets into frames?
No collisions will occur on this link.
Network address
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
To facilitate the entry and exit of data on media.
12. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
They must wait until the first hosts finish transfering the media.
To prevent the receiver from being overwhelmed by incoming data.
Network Layer
8
13. What is the primary purpose of ARP?
It uses lasers as the light source.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Resolve IPv4 addresses to MAC addresses.
A. goodput b. throughput c. bandwidth
14. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
FTP
Window Size
Source and Destination IP address
Ctrl + Shift + 6
15. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
Physical
Router(config)# interface FastEthernet 0/1
A. Cat5 UTP b. Cat6 UTP
UTP
16. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. What are 3 pieces of info about a route contained in a routing table?
A. next-hop b. metric/interface c. destination network address
Destination is not contacted before a packet is sent.
To prevent the receiver from being overwhelmed by incoming data.
Host mobility
18. How many bits make up an IPv4 address?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Physical
32 bits
19. Network Protocols
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. copper UTP b. optical fiber
20. What are the advantages of using a client-server model?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. it has centralized administration b. security is easier to enforce
It uses support from the lower layers to distinguish between connections to the service.
A. Cat5 UTP b. Cat6 UTP
21. What is the primary rope of the physical layer in transmitting data?
Hosts return to listen-before-transmit mode.
Create signals that represent the bits in each frame for the media.
The packets will be delivered and reassembled at destination.
To enable a receiving host to forward the data to the appropriate application.
22. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
A. copper UTP b. optical fiber
Supports error detection.
Rollover cable
255.255.255.0
23. Which portion of the network layer address does a router use to forward packets?
A. performance degradation b. security issues c. host identification
It provides for the exchange of data over a common local media.
Network portion
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
24. During encapsulation - what happens in the Data Link Layer?
A. goodput b. throughput c. bandwidth
RJ-45
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
The physical address is added.
25. What are 2 common characteristics associated w/ dynamic routing protocols?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
0 to 1023
The physical address is added.
Collisions can decrease network performance.
26. What does the IEEE 802.2 standard represent in Ethernet technologies?
Supports error detection.
A. enable mode b. priviledge executive mode
Logical Link Control sublayer
SSH
27. Which layer supplies services and allows user interface?
Application Layer
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. it has centralized administration b. security is easier to enforce
Fiber
28. Which combination of keys can be used to interrupt a ping or traceroute process?
The MAC protocol can be very simple.
FTP
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Ctrl + Shift + 6
29. Which IP packet field will prevent endless loops?
Next-Hop Address
The packets will be delivered and reassembled at destination.
Time-to-live (TTL)
Transport
30. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. replace a switch w/ a router b. subnet the new networks
Network Media Control
Ctrl + Shift + 6
31. What kind of problems are caused by excessive broadcast traffic on network segments?
A. goodput b. throughput c. bandwidth
A. copper UTP b. optical fiber
Router(config)# hostname Costas
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
32. Which characteristics describe fiber optic cable?
A. hot keys b. context-sensitive c. command syntax check
Is used by the server to resolve names.
Destination Network Address
A. not affected by EMI of RFI b. most expensive type of LAN cabling
33. What is dinamically selected by the source host when forwarding data?
Identify the device that allows local network computers to communicate w/ devices in other networks.
2046
The packets will be delivered and reassembled at destination.
Source Port
34. What do the intermediary devices in the network do?
It provides interface between applications on either end of the network.
DNS
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
35. What correctly describes a MAC address?
A. low overhead b. connectionless
Destination is not contacted before a packet is sent.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
36. What is the primary purpose of Layer 4?
A. DNS b. SMTP c. POP
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Identify processes or services that are communicating with end devices.
Router
37. 3 statements about routes and their use
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Is a layer of specific encapsulation.
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Network address
38. What is an automated service that matches resource names w/ required IP addresses?
Minimal delays in data delivery.
DNS
32 bits
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
39. What is the purpose of resource records in DNS?
8
A. application b. services
A. HTTP b. HTTPS
Is used by the server to resolve names.
40. What describes the purpose of default route?
IP Protocol
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A default gateway (router).
41. When a device is moved from one network to the other...?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Router
A. MTA b. SMTP
42. 3 functions of the upper data link sublayer in the OSI model
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. enable mode b. priviledge executive mode
To enable a receiving host to forward the data to the appropriate application.
43. Which type of cable is most often associated w/ fiber-optic cable?
A backbone cable.
Application Layer
Flash
A. replace a switch w/ a router b. subnet the new networks
44. At which layer of the TCP/IP model does ethernet operate?
Host A
Collisions can decrease network performance.
A. purpose b. geographic location c. ownership
Network Access
45. 2 most commonly used media types in ethernet networks
A. copper UTP b. optical fiber
Collisions can decrease network performance.
A. it has centralized administration b. security is easier to enforce
Rollover cable
46. When do changes take effect in a Cisco router?
As the commands are entered.
A. router b. firewall
UTP
A. it has centralized administration b. security is easier to enforce
47. To make a console connection from a comp to a Cisco router - what cable should be used?
Host mobility
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
UDP
Rollover cable
48. What is a drawback of the CSMA/CD access method?
Identify processes or services that are communicating with end devices.
Collisions can decrease network performance.
Router(config)# interface FastEthernet 0/1
IP Protocol
49. What statements describe the logical token-passing topology?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
It does not support encryption.
172.16.192.160
A. goodput b. throughput c. bandwidth
50. An admin needs to keep contents private - which access method should he use?
A. hot keys b. context-sensitive c. command syntax check
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
SSH
It does not support encryption.