SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
IP is not properly installed
Static
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
2. To make a console connection from a comp to a Cisco router - what cable should be used?
The packets will be delivered and reassembled at destination.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Rollover cable
MAC
3. Which 2 options represent Layer 4 addressing?
Create signals that represent the bits in each frame for the media.
A. MTA b. SMTP
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. identifies the communicating applications b. identifies multiple conversations between the hosts
4. What are 3 pieces of info about a route contained in a routing table?
IP Protocol
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. next-hop b. metric/interface c. destination network address
A. show startup-config b. show running-config
5. When destination network is not in the routing table - What are 2 actions the router might take?
TCP initializes the sequence numbers for the sessions.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. non-deterministic b. less overhead c. collisions exist
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
6. 3 protocols that operate in the application layer
A. DNS b. SMTP c. POP
It uses support from the lower layers to distinguish between connections to the service.
Router(config)# interface FastEthernet 0/1
Transport
7. 2 functions of encapsulation
A. goodput b. throughput c. bandwidth
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Show Interfaces
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
8. During a TCP session - if packets arrive out of order - what will happen?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
The packets will be delivered and reassembled at destination.
DNS
A. physical layer b. DLL layer
9. What is the primary rope of the physical layer in transmitting data?
Destination Network Address
Physical
Create signals that represent the bits in each frame for the media.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
10. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
The destination host address.
A. Physical b. Data Link
When connecting a host to a switch.
MAC
11. If you have a small network w/ 3 computers...
Network
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A backbone cable.
12. An admin needs to keep contents private - which access method should he use?
SSH
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. MTA b. SMTP
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
13. When do changes take effect in a Cisco router?
Create signals that represent the bits in each frame for the media.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
As the commands are entered.
Router(config)# hostname Costas
14. 3 measures of data transfer
A. goodput b. throughput c. bandwidth
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Application Layer
To prevent the receiver from being overwhelmed by incoming data.
15. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
SMB
A. DB 60 b. Winchester 15-pin c. smart serial
Any device whose backoff timer expires first.
16. How does the application layer on a server process multiple client requests for services?
It uses support from the lower layers to distinguish between connections to the service.
It provides for the exchange of data over a common local media.
A. DNS b. SMTP c. POP
Destination Network Address
17. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
Create signals that represent the bits in each frame for the media.
Hub
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
18. What correctly describes a MAC address?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. performance degradation b. security issues c. host identification
SSH
The MAC protocol can be very simple.
19. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
Network Layer
2046
SSH
Fiber
20. What are the advantages of using a client-server model?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. it has centralized administration b. security is easier to enforce
IP Protocol
As the commands are entered.
21. Default Gateway is incorrect on the host - What is the impact on the communications?
A. HTTP b. HTTPS
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Destination is not contacted before a packet is sent.
80 (HTTP)
22. Where is the IOS file stored at?
IP is not properly installed
Signal loss can be experienced.
Flash
MAC
23. How many bits make up an IPv4 address?
A. performance degradation b. security issues c. host identification
No collisions will occur on this link.
32 bits
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
24. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
A. DNS b. SMTP c. POP
32 bits
Network Layer Packet
Physical
25. 3 functions of the upper data link sublayer in the OSI model
IP is not properly installed
A. replace a switch w/ a router b. subnet the new networks
A. minimizing of collisions b. division into broadcast domains
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
26. What networking devices are recommended to be assigned static IP addresses?
0 to 1023
A. servers b. routers c. network printers
A. not affected by EMI of RFI b. most expensive type of LAN cabling
8
27. 2 characteristics of clients in data networks
RJ-45
A. they initiate data exchanges b. they may upload data to servers
A. addressing b. error detection c. frame delimiting
DNS
28. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
It uses support from the lower layers to distinguish between connections to the service.
80 (HTTP)
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
MAC
29. statements of IP adressing
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. they initiate data exchanges b. they may upload data to servers
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Wireless
30. Which device is used to create or divide broadcast domains?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Router
Time-to-live (TTL)
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
31. Why is flow control used for TCP data transfer?
255.255.255.224
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
To prevent the receiver from being overwhelmed by incoming data.
Originate data flow.
32. What is the proper order of the OSI Layers?
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Console interface
SSH
Physical
33. What determines the method of media access control?
Application Layer
A. media sharing b. logical topology
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
OTDR
34. What is the function of the DLL?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
It provides for the exchange of data over a common local media.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
To facilitate the entry and exit of data on media.
35. What is a characteristic of a single-mode fiber-optic cable?
It uses lasers as the light source.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
To facilitate the entry and exit of data on media.
As the commands are entered.
36. What is an effect of improperly applying a network cable connector?
Identify processes or services that are communicating with end devices.
Signal loss can be experienced.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
0 to 1023
37. What is a drawback of the CSMA/CD access method?
Console interface
Window Size
Collisions can decrease network performance.
A physical topology.
38. 3 properties of peer-2-peer applications
SSH
A. physical layer b. DLL layer
Switch
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
39. What characteristic of an UTP helps reduce interference?
It uses support from the lower layers to distinguish between connections to the service.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Twisting of the cables
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
40. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
UTP
It uses support from the lower layers to distinguish between connections to the service.
Logical Link Control sublayer
80 (HTTP)
41. What is the primary function of encapsulating packets into frames?
UDP
To facilitate the entry and exit of data on media.
Application Layer
A. purpose b. geographic location c. ownership
42. Statements that describe LAN
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
When connecting a host to a switch.
SSH
A. hot keys b. context-sensitive c. command syntax check
43. What application layer protocol is used to support file transfers between client and server?
IP is not properly installed
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
FTP
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
44. Why are port numbers included in the TCP header of a segment?
As the commands are entered.
Network
RJ-45
To enable a receiving host to forward the data to the appropriate application.
45. What is the purpose of resource records in DNS?
Identify processes or services that are communicating with end devices.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Is used by the server to resolve names.
Network Layer Packet
46. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. perform degradation b. security issues c. host identification
Binary ANDing
A. show startup-config b. show running-config
47. When is a straight-through cable used in a network?
When connecting a host to a switch.
A. perform degradation b. security issues c. host identification
A. hot keys b. context-sensitive c. command syntax check
0 to 1023
48. Which layer supplies services and allows user interface?
Application Layer
Transport
It provides for the exchange of data over a common local media.
A. Physical b. Data Link
49. What is PDU?
Router(config)# hostname Costas
The packets will be delivered and reassembled at destination.
Is a layer of specific encapsulation.
To prevent the receiver from being overwhelmed by incoming data.
50. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
A. next-hop b. metric/interface c. destination network address
Application Layer
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
UDP