SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What can get you to an outside network?
A default gateway (router).
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Source and Destination IP address
Application Layer
2. What do the intermediary devices in the network do?
8
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. Physical b. Data Link
Destination is not contacted before a packet is sent.
3. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
The address of the router that the host will use to 'get to the other side'.
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
TCP initializes the sequence numbers for the sessions.
Binary ANDing
4. What is the primary purpose of Layer 4?
Identify processes or services that are communicating with end devices.
A. next-hop b. metric/interface c. destination network address
Transport
A. perform degradation b. security issues c. host identification
5. 3 factors that should be considered when implementing Layer 2 protocols
A. enable mode b. priviledge executive mode
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Source Port
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
6. What is the purpose of the TCP/IP Network Application Layer?
Supports error detection.
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
It provides interface between applications on either end of the network.
Network Media Control
7. When a network service fails - which port is most often used to access a router for management purposes?
Console
SSH
When connecting a host to a switch.
Hosts return to listen-before-transmit mode.
8. Network Protocols
A. addressing b. error detection c. frame delimiting
Network Media Control
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
9. What is a component of a routing table entry?
Network portion
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Next-Hop Address
Static
10. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
UDP
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
255.255.255.0
Is used by the server to resolve names.
11. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
A. non-deterministic b. less overhead c. collisions exist
Time-to-live (TTL)
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Originate data flow.
12. 3 properties of peer-2-peer applications
A. low overhead b. connectionless
Twisting of the cables
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Network Layer Packet
13. 3 characteristics of valid Ethernet Layer 2 addresses
A. servers b. routers c. network printers
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
IP is not properly installed
Originate data flow.
14. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
They must wait until the first hosts finish transfering the media.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Network
Is used by the server to resolve names.
15. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
Console interface
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Host mobility
Hub
16. What networking devices are recommended to be assigned static IP addresses?
A. servers b. routers c. network printers
It has expanded adressing capabilities.
A. low overhead b. connectionless
A. netstat -r b. route PRINT
17. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
The MAC protocol can be very simple.
A. it has centralized administration b. security is easier to enforce
It does not support encryption.
Hosts return to listen-before-transmit mode.
18. Group of hosts that have identical bit patterns in the high order bits of their addresses
Time-to-live (TTL)
Wireless
Network
Is a layer of specific encapsulation.
19. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
172.16.192.160
A. replace a switch w/ a router b. subnet the new networks
A. servers b. routers c. network printers
A. copper UTP b. optical fiber
20. 3 measures of data transfer
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
RJ-45
A. goodput b. throughput c. bandwidth
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
21. What is an effect of improperly applying a network cable connector?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
2046
Signal loss can be experienced.
IP Protocol
22. What are 3 pieces of info about a route contained in a routing table?
A. purpose b. geographic location c. ownership
A. next-hop b. metric/interface c. destination network address
A. application b. services
A. DB 60 b. Winchester 15-pin c. smart serial
23. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
32 bits
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
255.255.255.224
24. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
It does not support encryption.
Next-Hop Address
Router(config)# interface FastEthernet 0/1
25. 2 functions of encapsulation
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
26. Where is the IOS file stored at?
Flash
A random delay helps prevent the stations from experiencing another collision during transmission.
As the commands are entered.
Network Layer Packet
27. What device can check for faults - integrity and performance of media?
Is a layer of specific encapsulation.
OTDR
Twisting of the cables
A. copper UTP b. optical fiber
28. What is a drawback of the CSMA/CD access method?
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
It uses lasers as the light source.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Collisions can decrease network performance.
29. What is the primary reason for developing IPv6?
Switch
Hosts return to listen-before-transmit mode.
A. non-deterministic b. less overhead c. collisions exist
It has expanded adressing capabilities.
30. What connectors are commonly associated w/ Cisco's V.35 serial cables?
255.255.255.0
Rollover cable
A. DB 60 b. Winchester 15-pin c. smart serial
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
31. What is the purpose of the preamble in an ethernet frame?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Identify processes or services that are communicating with end devices.
32. What do you need to use for an initial configuration on a Cisco router?
To facilitate the entry and exit of data on media.
Console interface
Host mobility
Fiber
33. 3 functions of the upper data link sublayer in the OSI model
A. non-deterministic b. less overhead c. collisions exist
Network portion
The destination host address.
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
34. During encapsulation - what happens in the Data Link Layer?
The packets will be delivered and reassembled at destination.
Destination Network Address
The physical address is added.
A. minimizing of collisions b. division into broadcast domains
35. What are 3 properties of contention-based media access for a shared media?
Fiber
A. non-deterministic b. less overhead c. collisions exist
UDP
Is a layer of specific encapsulation.
36. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
A. media sharing b. logical topology
Fiber
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. copper UTP b. optical fiber
37. Which 2 options represent Layer 4 addressing?
2046
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Rollover cable
255.255.255.224
38. At which layer of the TCP/IP model does ethernet operate?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Signal loss can be experienced.
Show Interfaces
Network Access
39. 3 features of IPv6
Network Layer
A. larger address space b. data types and classes of service c. authentication and encryption
A. performance degradation b. security issues c. host identification
Flash
40. What can be a problem that is reduced by adding end-to-end addressing?
Any device whose backoff timer expires first.
It reduces unnecessary broadcasts.
It does not support encryption.
172.16.192.160
41. If the router says: 'Switch-East4#' What identifies the CLI mode represented?
Window Size
Hosts return to listen-before-transmit mode.
A. Physical b. Data Link
A. enable mode b. priviledge executive mode
42. Which IP packet field will prevent endless loops?
A. copper UTP b. optical fiber
It uses lasers as the light source.
Time-to-live (TTL)
255.255.255.224
43. What kind of problems are caused by excessive broadcast traffic on network segments?
It reduces unnecessary broadcasts.
A. media sharing b. logical topology
SSH
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
44. During a TCP session - if packets arrive out of order - what will happen?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
The MAC protocol can be very simple.
The packets will be delivered and reassembled at destination.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
45. What are key considering factors when grouping hosts into common networks?
Twisting of the cables
A. purpose b. geographic location c. ownership
Binary ANDing
A. enable mode b. priviledge executive mode
46. If you have a full-duplex operational network - what can happen?
Router(config)# hostname Costas
It has expanded adressing capabilities.
255.255.255.224
No collisions will occur on this link.
47. 3 primary functions of the data link layer encapsulation
A. addressing b. error detection c. frame delimiting
A. copper UTP b. optical fiber
Time-to-live (TTL)
They must wait until the first hosts finish transfering the media.
48. What causes crosstalk within cable pairs when using UTP?
A. DNS b. SMTP c. POP
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
The magnetic field around the adjacent pairs of wire.
Network Media Control
49. What makes fiber preferable to copper for interconnecting buildings?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Host mobility
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
50. What type of network cable is used between a terminal and a console port?
Rollover cable
The magnetic field around the adjacent pairs of wire.
A. they initiate data exchanges b. they may upload data to servers
Source Port