SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the advantages of using a client-server model?
Host A
A. it has centralized administration b. security is easier to enforce
A. the router will discard the packet b. the router will send a time exceeded message to the source host
It reduces unnecessary broadcasts.
2. Group of hosts that have identical bit patterns in the high order bits of their addresses
Network
Destination Network Address
A. Physical b. Data Link
Rollover cable
3. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
DNS
A. perform degradation b. security issues c. host identification
Network Access
A. the router will discard the packet b. the router will send a time exceeded message to the source host
4. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
They must wait until the first hosts finish transfering the media.
Time-to-live (TTL)
The address of the router that the host will use to 'get to the other side'.
5. What is a drawback of the CSMA/CD access method?
Collisions can decrease network performance.
It uses support from the lower layers to distinguish between connections to the service.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Switch
6. In a connectionless system - What is correct?
It uses support from the lower layers to distinguish between connections to the service.
When connecting a host to a switch.
A physical topology.
Destination is not contacted before a packet is sent.
7. 3 primary functions of the data link layer encapsulation
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Application Layer
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. addressing b. error detection c. frame delimiting
8. What information is added during encapsulation at OSI Layer 3?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. minimizing of collisions b. division into broadcast domains
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Source and Destination IP address
9. 2 characteristics of clients in data networks
A. goodput b. throughput c. bandwidth
A. they initiate data exchanges b. they may upload data to servers
Binary ANDing
It provides for the exchange of data over a common local media.
10. Which IP packet field will prevent endless loops?
Supports error detection.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Time-to-live (TTL)
Static
11. When destination network is not in the routing table - What are 2 actions the router might take?
Wireless
Next-Hop Address
Identify processes or services that are communicating with end devices.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
12. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
A. physical layer b. DLL layer
UTP
UDP
Is used by the server to resolve names.
13. Intermediary devices used to implement security between networks
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Physical
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. router b. firewall
14. What method of signal transmission uses radio waves to carry signals?
Wireless
The address of the router that the host will use to 'get to the other side'.
Switch
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
15. What is dinamically selected by the source host when forwarding data?
UDP
Source Port
Originate data flow.
Wireless
16. 3 statements about the role of routers in the network
Transport
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Application Layer
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
17. Important characteristic of UDP
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Network Layer
Minimal delays in data delivery.
18. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
A. DB 60 b. Winchester 15-pin c. smart serial
RJ-45
MAC
255.255.255.224
19. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
It has expanded adressing capabilities.
Network address
SSH
To facilitate the entry and exit of data on media.
20. What is the primary reason for developing IPv6?
UDP
It has expanded adressing capabilities.
When connecting a host to a switch.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
21. There are too many broadcasts on switches - what can be done?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Network address
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. replace a switch w/ a router b. subnet the new networks
22. What is an effect of improperly applying a network cable connector?
Signal loss can be experienced.
A physical topology.
Logical Link Control sublayer
255.255.255.224
23. Which portion of the network layer address does a router use to forward packets?
UTP
FTP
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Network portion
24. What are 2 features of User Diagram Protocol (UDP)?
A. hot keys b. context-sensitive c. command syntax check
RJ-45
MAC
A. low overhead b. connectionless
25. 2 characteristics of peer-2-peer
Identify the device that allows local network computers to communicate w/ devices in other networks.
Supports error detection.
A. decentralized resources b. resource sharing w/o a dedicated server
FTP
26. What is a characteristic of a single-mode fiber-optic cable?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
It uses lasers as the light source.
Source and Destination IP address
The packets will be delivered and reassembled at destination.
27. At which layers of the OSI model does ethernet operate?
Time-to-live (TTL)
Host mobility
A. physical layer b. DLL layer
A. larger address space b. data types and classes of service c. authentication and encryption
28. 2 features that make switches preferable to hubs
A. minimizing of collisions b. division into broadcast domains
A. perform degradation b. security issues c. host identification
Minimal delays in data delivery.
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
29. During a TCP session - if packets arrive out of order - what will happen?
The packets will be delivered and reassembled at destination.
To enable a receiving host to forward the data to the appropriate application.
A. enable mode b. priviledge executive mode
Network Layer
30. What command is used to change the default name to 'Costas'?
Flash
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Router(config)# hostname Costas
Network address
31. 3 factors that should be considered when implementing Layer 2 protocols
A. decentralized resources b. resource sharing w/o a dedicated server
Binary ANDing
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
IP is not properly installed
32. Which device is used to create or divide broadcast domains?
Network Media Control
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Router
33. 3 properties of peer-2-peer applications
A. minimizing of collisions b. division into broadcast domains
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Minimal delays in data delivery.
FTP
34. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
Fiber
DNS
UTP
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
35. What is the purpose of the preamble in an ethernet frame?
It provides interface between applications on either end of the network.
IP is not properly installed
A. enable mode b. priviledge executive mode
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
36. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
Logical Link Control sublayer
A. show startup-config b. show running-config
Network portion
255.255.255.0
37. What is the proper order of the OSI Layers?
Binary ANDing
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Host A
A. application b. presentation c. session d. transmision e. network f. data link g. physical
38. What is the purpose of the TCP/IP Network Application Layer?
32 bits
Network Media Control
Host mobility
Host A
39. What event occurs during the 3-way handshake?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
TCP initializes the sequence numbers for the sessions.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
The packets will be delivered and reassembled at destination.
40. Default Gateway is incorrect on the host - What is the impact on the communications?
Time-to-live (TTL)
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. DNS b. SMTP c. POP
As the commands are entered.
41. What can get you to an outside network?
A default gateway (router).
A. minimizing of collisions b. division into broadcast domains
Identify processes or services that are communicating with end devices.
Wireless
42. If you have a small network w/ 3 computers...
The MAC protocol can be very simple.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Transport
A. copper UTP b. optical fiber
43. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
Transport
255.255.255.224
A. media sharing b. logical topology
A. decentralized resources b. resource sharing w/o a dedicated server
44. What type of routing uses information that is manually entered into the routing table?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Static
Router(config)# hostname Costas
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
45. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
A. Physical b. Data Link
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Static
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
46. In business LANs - which connector is used w/ twisted-pair networking cable?
To enable a receiving host to forward the data to the appropriate application.
RJ-45
A. Cat5 UTP b. Cat6 UTP
0 to 1023
47. What type of network cable is used between a terminal and a console port?
80 (HTTP)
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Rollover cable
A. larger address space b. data types and classes of service c. authentication and encryption
48. What is a disadvantage of Telnet?
A. performance degradation b. security issues c. host identification
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
It does not support encryption.
A. media sharing b. logical topology
49. An admin needs to keep contents private - which access method should he use?
A. they initiate data exchanges b. they may upload data to servers
A. hot keys b. context-sensitive c. command syntax check
32 bits
SSH
50. What are key considering factors when grouping hosts into common networks?
A. purpose b. geographic location c. ownership
Minimal delays in data delivery.
UDP
A. flow control b. session establishment c. numbering and sequencing