SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What device can check for faults - integrity and performance of media?
OTDR
Next-Hop Address
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Identify processes or services that are communicating with end devices.
2. 3 features that allow TCP to realibly and accurately track the transmission of data
A. router b. firewall
A. flow control b. session establishment c. numbering and sequencing
A. not affected by EMI of RFI b. most expensive type of LAN cabling
32 bits
3. Which IP packet field will prevent endless loops?
Create signals that represent the bits in each frame for the media.
Time-to-live (TTL)
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
RJ-45
4. Important characteristic of UDP
A. DB 60 b. Winchester 15-pin c. smart serial
Minimal delays in data delivery.
Source Port
Source and Destination Ports
5. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
As the commands are entered.
Network address
0 to 1023
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
6. Which device is used to create or divide broadcast domains?
Network Layer
Source and Destination Ports
Collisions can decrease network performance.
Router
7. 3 features of IPv6
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. larger address space b. data types and classes of service c. authentication and encryption
Network Layer Packet
8. What are 3 pieces of info about a route contained in a routing table?
A. minimizing of collisions b. division into broadcast domains
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. next-hop b. metric/interface c. destination network address
Flash
9. What does the IEEE 802.2 standard represent in Ethernet technologies?
80 (HTTP)
The address of the router that the host will use to 'get to the other side'.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Logical Link Control sublayer
10. What do you need to use for an initial configuration on a Cisco router?
It uses lasers as the light source.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
It does not support encryption.
Console interface
11. Which type of cable is most often associated w/ fiber-optic cable?
Resolve IPv4 addresses to MAC addresses.
Console
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A backbone cable.
12. Which combination of keys can be used to interrupt a ping or traceroute process?
Time-to-live (TTL)
It has expanded adressing capabilities.
A. next-hop b. metric/interface c. destination network address
Ctrl + Shift + 6
13. An admin needs to keep contents private - which access method should he use?
Hosts return to listen-before-transmit mode.
SSH
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
255.255.255.0
14. What can you identify when you examine the Network Layer header?
The destination host address.
A. hot keys b. context-sensitive c. command syntax check
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
15. How many bits make up an IPv4 address?
A. servers b. routers c. network printers
A. goodput b. throughput c. bandwidth
Collisions can decrease network performance.
32 bits
16. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
Resolve IPv4 addresses to MAC addresses.
A. DB 60 b. Winchester 15-pin c. smart serial
A default gateway (router).
8
17. What is the function of the DLL?
Supports error detection.
No collisions will occur on this link.
It provides for the exchange of data over a common local media.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
18. What is a benefit of a WAN?
UDP
Host mobility
It provides interface between applications on either end of the network.
Create signals that represent the bits in each frame for the media.
19. Intermediary devices used to implement security between networks
A. router b. firewall
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. flow control b. session establishment c. numbering and sequencing
Source Port
20. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
They must wait until the first hosts finish transfering the media.
Window Size
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. DNS b. SMTP c. POP
21. 3 properties of peer-2-peer applications
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
It uses support from the lower layers to distinguish between connections to the service.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. performance degradation b. security issues c. host identification
22. 2 characteristics of peer-2-peer
Ctrl + Shift + 6
When connecting a host to a switch.
A. decentralized resources b. resource sharing w/o a dedicated server
A. DB 60 b. Winchester 15-pin c. smart serial
23. What command is used to change the default name to 'Costas'?
Router(config)# hostname Costas
Host mobility
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
The physical address is added.
24. What is an effect of improperly applying a network cable connector?
A. DB 60 b. Winchester 15-pin c. smart serial
2046
Signal loss can be experienced.
A physical topology.
25. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
UTP
Network
A. copper UTP b. optical fiber
It provides for the exchange of data over a common local media.
26. What layer encapsulates segments into packets?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. physical layer b. DLL layer
A. it has centralized administration b. security is easier to enforce
Network Layer
27. What is PDU?
Network Access
Is a layer of specific encapsulation.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
When connecting a host to a switch.
28. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. decentralized resources b. resource sharing w/o a dedicated server
FTP
8
29. Why is flow control used for TCP data transfer?
Network Layer
A. performance degradation b. security issues c. host identification
To prevent the receiver from being overwhelmed by incoming data.
It uses lasers as the light source.
30. 2 most commonly used media types in ethernet networks
Network
A. copper UTP b. optical fiber
Hosts return to listen-before-transmit mode.
A default gateway (router).
31. What are key considering factors when grouping hosts into common networks?
Network Layer
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Network portion
A. purpose b. geographic location c. ownership
32. What event occurs during the 3-way handshake?
TCP initializes the sequence numbers for the sessions.
255.255.255.0
UDP
Create signals that represent the bits in each frame for the media.
33. When destination network is not in the routing table - What are 2 actions the router might take?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Static
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. Physical b. Data Link
34. There are too many broadcasts on switches - what can be done?
80 (HTTP)
Twisting of the cables
A. replace a switch w/ a router b. subnet the new networks
A. copper UTP b. optical fiber
35. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
A. router b. firewall
A. servers b. routers c. network printers
Physical
A backbone cable.
36. What correctly describes a MAC address?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Twisting of the cables
A physical topology.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
37. When do changes take effect in a Cisco router?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
As the commands are entered.
A. perform degradation b. security issues c. host identification
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
38. In business LANs - which connector is used w/ twisted-pair networking cable?
A. perform degradation b. security issues c. host identification
RJ-45
Any device whose backoff timer expires first.
255.255.255.224
39. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
Signal loss can be experienced.
A backbone cable.
172.16.192.160
A. copper UTP b. optical fiber
40. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
They must wait until the first hosts finish transfering the media.
To facilitate the entry and exit of data on media.
It provides interface between applications on either end of the network.
A. hot keys b. context-sensitive c. command syntax check
41. 3 statements about routes and their use
A. hot keys b. context-sensitive c. command syntax check
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Transport
Twisting of the cables
42. If you have a small network w/ 3 computers...
Fiber
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
The address of the router that the host will use to 'get to the other side'.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
43. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
Hosts return to listen-before-transmit mode.
A. DNS b. SMTP c. POP
A. addressing b. error detection c. frame delimiting
UDP
44. What is an automated service that matches resource names w/ required IP addresses?
Source Port
DNS
A. low overhead b. connectionless
Create signals that represent the bits in each frame for the media.
45. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
Console
SMB
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
IP is not properly installed
46. What type of routing uses information that is manually entered into the routing table?
Static
SSH
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. low overhead b. connectionless
47. What is a characteristic of a single-mode fiber-optic cable?
It uses lasers as the light source.
A. goodput b. throughput c. bandwidth
Host A
Rollover cable
48. What makes fiber preferable to copper for interconnecting buildings?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Window Size
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Logical Link Control sublayer
49. What is the primary rope of the physical layer in transmitting data?
Network
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Create signals that represent the bits in each frame for the media.
It provides interface between applications on either end of the network.
50. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183