SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does the application layer on a server process multiple client requests for services?
A. goodput b. throughput c. bandwidth
It uses support from the lower layers to distinguish between connections to the service.
A. enable mode b. priviledge executive mode
Host A
2. After an ethernet collision - which device has priority to transmit data?
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
It provides for the exchange of data over a common local media.
Any device whose backoff timer expires first.
3. Important characteristic of UDP
Minimal delays in data delivery.
A. replace a switch w/ a router b. subnet the new networks
Application Layer
Physical
4. There are too many broadcasts on switches - what can be done?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. replace a switch w/ a router b. subnet the new networks
A. show startup-config b. show running-config
Switch
5. What is the primary reason for developing IPv6?
Host mobility
It has expanded adressing capabilities.
To enable a receiving host to forward the data to the appropriate application.
Console
6. What are the advantages of using a client-server model?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Originate data flow.
The address of the router that the host will use to 'get to the other side'.
A. it has centralized administration b. security is easier to enforce
7. What is the primary rope of the physical layer in transmitting data?
Create signals that represent the bits in each frame for the media.
Source and Destination Ports
Transport
A. larger address space b. data types and classes of service c. authentication and encryption
8. What connectors are commonly associated w/ Cisco's V.35 serial cables?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
The physical address is added.
A. DB 60 b. Winchester 15-pin c. smart serial
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
9. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
0 to 1023
Signal loss can be experienced.
Fiber
Network Access
10. What command is used to change the default name to 'Costas'?
Console
Next-Hop Address
Router(config)# hostname Costas
The address of the router that the host will use to 'get to the other side'.
11. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
Fiber
32 bits
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
8
12. What networking devices are recommended to be assigned static IP addresses?
Supports error detection.
A. servers b. routers c. network printers
RJ-45
Host A
13. 3 statements of media acess control
A. replace a switch w/ a router b. subnet the new networks
A. hot keys b. context-sensitive c. command syntax check
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Collisions can decrease network performance.
14. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
A. MTA b. SMTP
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
UDP
15. statements of IP adressing
It provides interface between applications on either end of the network.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Originate data flow.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
16. If you have a small network w/ 3 computers...
Flash
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
17. What are 3 properties of contention-based media access for a shared media?
A. non-deterministic b. less overhead c. collisions exist
TCP initializes the sequence numbers for the sessions.
As the commands are entered.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
18. During a TCP session - if packets arrive out of order - what will happen?
The packets will be delivered and reassembled at destination.
Originate data flow.
Destination is not contacted before a packet is sent.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
19. What can you identify when you examine the Network Layer header?
The destination host address.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. physical layer b. DLL layer
172.16.192.160
20. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
8
A. not affected by EMI of RFI b. most expensive type of LAN cabling
It has expanded adressing capabilities.
It does not support encryption.
21. 3 functions of the upper data link sublayer in the OSI model
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Static
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
22. At which layer of the TCP/IP model does ethernet operate?
Network Access
Originate data flow.
A. addressing b. error detection c. frame delimiting
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
23. What are 3 pieces of info about a route contained in a routing table?
Console
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
It uses lasers as the light source.
A. next-hop b. metric/interface c. destination network address
24. What characteristic of an UTP helps reduce interference?
Twisting of the cables
A physical topology.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
SMB
25. What is the role of MTA in handling email?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Show Interfaces
26. When do changes take effect in a Cisco router?
Logical Link Control sublayer
A. larger address space b. data types and classes of service c. authentication and encryption
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
As the commands are entered.
27. What info is found in the TCP and UDP header info?
To facilitate the entry and exit of data on media.
A. enable mode b. priviledge executive mode
MAC
Source and Destination Ports
28. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
The address of the router that the host will use to 'get to the other side'.
A. DB 60 b. Winchester 15-pin c. smart serial
It reduces unnecessary broadcasts.
29. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
Source Port
A. the router will discard the packet b. the router will send a time exceeded message to the source host
As the commands are entered.
Create signals that represent the bits in each frame for the media.
30. What type of routing uses information that is manually entered into the routing table?
UDP
Static
Wireless
Time-to-live (TTL)
31. What is a protocol that provides connectionless network layer services?
A. flow control b. session establishment c. numbering and sequencing
The address of the router that the host will use to 'get to the other side'.
A. physical layer b. DLL layer
IP Protocol
32. 2 features that make switches preferable to hubs
Window Size
Time-to-live (TTL)
A. enable mode b. priviledge executive mode
A. minimizing of collisions b. division into broadcast domains
33. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
Hub
Originate data flow.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
It does not support encryption.
34. Which type of cable is most often associated w/ fiber-optic cable?
A backbone cable.
Host mobility
Network Layer Packet
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
35. Which combination of keys can be used to interrupt a ping or traceroute process?
RJ-45
Ctrl + Shift + 6
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A backbone cable.
36. 3 facts about the network portion of an IPv4 address
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Transport
A. they initiate data exchanges b. they may upload data to servers
The address of the router that the host will use to 'get to the other side'.
37. What command can be used to determine if the router has experienced any input or output errors?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. addressing b. error detection c. frame delimiting
Show Interfaces
A. low overhead b. connectionless
38. What are 2 features of User Diagram Protocol (UDP)?
To enable a receiving host to forward the data to the appropriate application.
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A. low overhead b. connectionless
A. purpose b. geographic location c. ownership
39. What do you need to use for an initial configuration on a Cisco router?
Transport
No collisions will occur on this link.
Console interface
The magnetic field around the adjacent pairs of wire.
40. What device can check for faults - integrity and performance of media?
The physical address is added.
80 (HTTP)
OTDR
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
41. 3 terms that define the forms of help available within the Cisco IOS
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. hot keys b. context-sensitive c. command syntax check
Source and Destination Ports
A. media sharing b. logical topology
42. If you have a full-duplex operational network - what can happen?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Source and Destination Ports
No collisions will occur on this link.
43. What is an automated service that matches resource names w/ required IP addresses?
DNS
A. minimizing of collisions b. division into broadcast domains
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Static
44. 3 primary functions of the data link layer encapsulation
It provides interface between applications on either end of the network.
A. DB 60 b. Winchester 15-pin c. smart serial
A. addressing b. error detection c. frame delimiting
Network Access
45. When destination network is not in the routing table - What are 2 actions the router might take?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Rollover cable
Destination Network Address
It uses support from the lower layers to distinguish between connections to the service.
46. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
A. enable mode b. priviledge executive mode
Network Access
Router(config)# hostname Costas
Host A
47. Where is the IOS file stored at?
Flash
255.255.255.224
SSH
Network address
48. 3 protocols that operate in the application layer
The address of the router that the host will use to 'get to the other side'.
A. DNS b. SMTP c. POP
Static
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
49. What is the primary function of encapsulating packets into frames?
A. minimizing of collisions b. division into broadcast domains
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. next-hop b. metric/interface c. destination network address
To facilitate the entry and exit of data on media.
50. 3 statements about the role of routers in the network
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
MAC
Network Access
Next-Hop Address