SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What method of signal transmission uses radio waves to carry signals?
Wireless
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Network Media Control
To prevent the receiver from being overwhelmed by incoming data.
2. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
A physical topology.
Host A
Console
A. replace a switch w/ a router b. subnet the new networks
3. Where is the IOS file stored at?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. copper UTP b. optical fiber
Flash
Create signals that represent the bits in each frame for the media.
4. What can you identify when you examine the Network Layer header?
Destination is not contacted before a packet is sent.
Ctrl + Shift + 6
A backbone cable.
The destination host address.
5. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
255.255.255.224
UTP
The MAC protocol can be very simple.
SSH
7. Which device is used to create or divide broadcast domains?
Router
Time-to-live (TTL)
The magnetic field around the adjacent pairs of wire.
32 bits
8. What are the advantages of using a client-server model?
Binary ANDing
0 to 1023
A. it has centralized administration b. security is easier to enforce
A. media sharing b. logical topology
9. When a device is moved from one network to the other...?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
172.16.192.160
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
10. If there is a graphic representation of a company network wiring and equipment - What is this called?
TCP initializes the sequence numbers for the sessions.
A physical topology.
Collisions can decrease network performance.
A. purpose b. geographic location c. ownership
11. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Signal loss can be experienced.
Source Port
Console
Destination Network Address
12. 2 functions of encapsulation
The magnetic field around the adjacent pairs of wire.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
DNS
13. What is the proper order of the OSI Layers?
MAC
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. it has centralized administration b. security is easier to enforce
14. 2 characteristics of peer-2-peer
A. decentralized resources b. resource sharing w/o a dedicated server
Destination Network Address
The destination host address.
The address of the router that the host will use to 'get to the other side'.
15. 3 characteristics of valid Ethernet Layer 2 addresses
IP is not properly installed
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
16. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
The magnetic field around the adjacent pairs of wire.
The packets will be delivered and reassembled at destination.
A. low overhead b. connectionless
Transport
17. How many bits make up an IPv4 address?
32 bits
UDP
Signal loss can be experienced.
It uses lasers as the light source.
18. What application layer protocol is used to support file transfers between client and server?
FTP
A. flow control b. session establishment c. numbering and sequencing
Transport
A physical topology.
19. What is the purpose of the TCP/IP Network Application Layer?
Network Media Control
255.255.255.0
A. minimizing of collisions b. division into broadcast domains
Source Port
20. On a ethernet segment - why do hosts that experience a collision use a random delay before attempting to transmit?
A random delay helps prevent the stations from experiencing another collision during transmission.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
The destination host address.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
21. There are too many broadcasts on switches - what can be done?
Originate data flow.
UTP
A. replace a switch w/ a router b. subnet the new networks
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
22. What are 2 email components used to forward mail between servers?
2046
A. MTA b. SMTP
Twisting of the cables
The packets will be delivered and reassembled at destination.
23. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
It does not support encryption.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
To prevent the receiver from being overwhelmed by incoming data.
24. What do end devices do?
Network Access
255.255.255.0
Originate data flow.
Hub
25. Which combination of keys can be used to interrupt a ping or traceroute process?
UTP
A. goodput b. throughput c. bandwidth
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Ctrl + Shift + 6
26. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
Is a layer of specific encapsulation.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
MAC
It uses support from the lower layers to distinguish between connections to the service.
27. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Router(config)# interface FastEthernet 0/1
It uses support from the lower layers to distinguish between connections to the service.
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
28. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
Switch
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
As the commands are entered.
A. DB 60 b. Winchester 15-pin c. smart serial
29. 3 protocols that operate in the application layer
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Router
A. DNS b. SMTP c. POP
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
30. What are 3 properties of contention-based media access for a shared media?
A. non-deterministic b. less overhead c. collisions exist
Network
Network Layer Packet
Network Access
31. What is the role of MTA in handling email?
Flash
UTP
The MAC protocol can be very simple.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
32. 3 statements about the role of routers in the network
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
255.255.255.0
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
33. What is a component of a routing table entry?
IP Protocol
A. router b. firewall
Next-Hop Address
Logical Link Control sublayer
34. What is the primary function of encapsulating packets into frames?
The address of the router that the host will use to 'get to the other side'.
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
To facilitate the entry and exit of data on media.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
35. Why is flow control used for TCP data transfer?
MAC
Supports error detection.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
To prevent the receiver from being overwhelmed by incoming data.
36. What event occurs during the 3-way handshake?
Resolve IPv4 addresses to MAC addresses.
TCP initializes the sequence numbers for the sessions.
The destination host address.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
37. 2 characteristics of clients in data networks
The packets will be delivered and reassembled at destination.
Network portion
172.16.192.160
A. they initiate data exchanges b. they may upload data to servers
38. 2 features that make switches preferable to hubs
A. replace a switch w/ a router b. subnet the new networks
Switch
0 to 1023
A. minimizing of collisions b. division into broadcast domains
39. What networking devices are recommended to be assigned static IP addresses?
A. servers b. routers c. network printers
Switch
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
DNS
40. What are 2 protocols for transfering web resources?
A. larger address space b. data types and classes of service c. authentication and encryption
It provides for the exchange of data over a common local media.
A. HTTP b. HTTPS
Router(config)# hostname Costas
41. In business LANs - which connector is used w/ twisted-pair networking cable?
A default gateway (router).
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
RJ-45
42. During a TCP session - if packets arrive out of order - what will happen?
Network Layer Packet
The packets will be delivered and reassembled at destination.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
It does not support encryption.
43. What are 2 forms of application layer software?
Window Size
It reduces unnecessary broadcasts.
A. application b. services
Originate data flow.
44. Statements that describe LAN
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
255.255.255.0
Network Layer
A default gateway (router).
45. Default Gateway is incorrect on the host - What is the impact on the communications?
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. DNS b. SMTP c. POP
It uses support from the lower layers to distinguish between connections to the service.
A. servers b. routers c. network printers
46. Which type of cable is most often associated w/ fiber-optic cable?
255.255.255.224
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A backbone cable.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
47. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
A. show startup-config b. show running-config
A. Physical b. Data Link
Time-to-live (TTL)
Network portion
48. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
Supports error detection.
A. performance degradation b. security issues c. host identification
TCP initializes the sequence numbers for the sessions.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
49. What is the purpose of a default gateway?
A. DB 60 b. Winchester 15-pin c. smart serial
Identify the device that allows local network computers to communicate w/ devices in other networks.
Host mobility
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
50. What info is found in the TCP and UDP header info?
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Source and Destination Ports
Network
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet