SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
FTP
A. it has centralized administration b. security is easier to enforce
A default gateway (router).
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
2. What connectors are commonly associated w/ Cisco's V.35 serial cables?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. DB 60 b. Winchester 15-pin c. smart serial
Network Layer Packet
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
3. When a network service fails - which port is most often used to access a router for management purposes?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. purpose b. geographic location c. ownership
Console
A. decentralized resources b. resource sharing w/o a dedicated server
4. What 2 type of cables would most commonly be used for new runs?
A. Cat5 UTP b. Cat6 UTP
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. addressing b. error detection c. frame delimiting
5. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
Supports error detection.
A. show startup-config b. show running-config
Identify processes or services that are communicating with end devices.
Router(config)# hostname Costas
6. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
Switch
A. enable mode b. priviledge executive mode
SMB
The magnetic field around the adjacent pairs of wire.
7. What application layer protocol is used to support file transfers between client and server?
A. perform degradation b. security issues c. host identification
FTP
A physical topology.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
8. 3 protocols that operate in the application layer
To facilitate the entry and exit of data on media.
Router(config)# interface FastEthernet 0/1
It provides for the exchange of data over a common local media.
A. DNS b. SMTP c. POP
9. In business LANs - which connector is used w/ twisted-pair networking cable?
Network Layer Packet
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. DNS b. SMTP c. POP
RJ-45
10. What is dinamically selected by the source host when forwarding data?
IP Protocol
Network
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Source Port
11. What command is used to change the default name to 'Costas'?
UTP
Console
Router(config)# hostname Costas
The destination host address.
12. 3 statements of media acess control
8
172.16.192.160
Hub
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
13. 3 measures of data transfer
A. goodput b. throughput c. bandwidth
Is a layer of specific encapsulation.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
14. statements of IP adressing
Binary ANDing
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
It does not support encryption.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
15. How does the application layer on a server process multiple client requests for services?
It uses support from the lower layers to distinguish between connections to the service.
A. decentralized resources b. resource sharing w/o a dedicated server
0 to 1023
Static
16. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
A. perform degradation b. security issues c. host identification
Router(config)# interface FastEthernet 0/1
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Network Media Control
17. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
The packets will be delivered and reassembled at destination.
Transport
Time-to-live (TTL)
Network
18. What are 3 pieces of info about a route contained in a routing table?
Resolve IPv4 addresses to MAC addresses.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. next-hop b. metric/interface c. destination network address
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
19. What characteristic of an UTP helps reduce interference?
Any device whose backoff timer expires first.
Source and Destination IP address
Network Access
Twisting of the cables
20. What correctly describes a MAC address?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. hot keys b. context-sensitive c. command syntax check
80 (HTTP)
21. What method of signal transmission uses radio waves to carry signals?
Wireless
A. larger address space b. data types and classes of service c. authentication and encryption
172.16.192.160
A. enable mode b. priviledge executive mode
22. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
SSH
Physical
Create signals that represent the bits in each frame for the media.
255.255.255.224
23. What causes crosstalk within cable pairs when using UTP?
Supports error detection.
A. purpose b. geographic location c. ownership
Network portion
The magnetic field around the adjacent pairs of wire.
24. What event occurs during the 3-way handshake?
A. minimizing of collisions b. division into broadcast domains
A. not affected by EMI of RFI b. most expensive type of LAN cabling
TCP initializes the sequence numbers for the sessions.
Twisting of the cables
25. What is a characteristic of a logical point-to-point topology?
The MAC protocol can be very simple.
Router
A. hot keys b. context-sensitive c. command syntax check
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
26. What networking devices are recommended to be assigned static IP addresses?
A. servers b. routers c. network printers
A. MTA b. SMTP
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
It has expanded adressing capabilities.
27. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
80 (HTTP)
8
Time-to-live (TTL)
0 to 1023
28. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
Next-Hop Address
A. hot keys b. context-sensitive c. command syntax check
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. show startup-config b. show running-config
29. What is the primary purpose of ARP?
SSH
Resolve IPv4 addresses to MAC addresses.
Physical
It does not support encryption.
30. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
Hosts return to listen-before-transmit mode.
A. Physical b. Data Link
A. servers b. routers c. network printers
A random delay helps prevent the stations from experiencing another collision during transmission.
31. What is the primary rope of the physical layer in transmitting data?
It provides for the exchange of data over a common local media.
2046
Create signals that represent the bits in each frame for the media.
It has expanded adressing capabilities.
32. What statements describe the logical token-passing topology?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Twisting of the cables
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. purpose b. geographic location c. ownership
33. What is the purpose of the TCP/IP Network Application Layer?
MAC
Show Interfaces
Network Media Control
It uses lasers as the light source.
34. What can you identify when you examine the Network Layer header?
The magnetic field around the adjacent pairs of wire.
The destination host address.
Destination is not contacted before a packet is sent.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
35. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Hosts return to listen-before-transmit mode.
It has expanded adressing capabilities.
Twisting of the cables
36. To make a console connection from a comp to a Cisco router - what cable should be used?
Rollover cable
Signal loss can be experienced.
2046
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
37. What is an effect of improperly applying a network cable connector?
Signal loss can be experienced.
255.255.255.0
A. performance degradation b. security issues c. host identification
IP Protocol
38. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
A. servers b. routers c. network printers
Window Size
A. larger address space b. data types and classes of service c. authentication and encryption
8
39. What is the primary reason for developing IPv6?
It has expanded adressing capabilities.
Hosts return to listen-before-transmit mode.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Window Size
40. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
Router(config)# hostname Costas
172.16.192.160
A default gateway (router).
A. larger address space b. data types and classes of service c. authentication and encryption
41. What does the IEEE 802.2 standard represent in Ethernet technologies?
MAC
Logical Link Control sublayer
255.255.255.0
Physical
42. What is a protocol that provides connectionless network layer services?
Logical Link Control sublayer
Binary ANDing
A. application b. services
IP Protocol
43. How many bits make up an IPv4 address?
A. enable mode b. priviledge executive mode
DNS
32 bits
A. hot keys b. context-sensitive c. command syntax check
44. When do changes take effect in a Cisco router?
A. it has centralized administration b. security is easier to enforce
Hosts return to listen-before-transmit mode.
As the commands are entered.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
45. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
FTP
Network
To prevent the receiver from being overwhelmed by incoming data.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
46. What determines the method of media access control?
The physical address is added.
SMB
Router(config)# interface FastEthernet 0/1
A. media sharing b. logical topology
47. What command can be used to determine if the router has experienced any input or output errors?
A. it has centralized administration b. security is easier to enforce
Show Interfaces
It uses lasers as the light source.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
48. What do you need to use for an initial configuration on a Cisco router?
A. Cat5 UTP b. Cat6 UTP
To prevent the receiver from being overwhelmed by incoming data.
Console interface
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
49. What device can check for faults - integrity and performance of media?
Destination is not contacted before a packet is sent.
OTDR
They must wait until the first hosts finish transfering the media.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
50. At which layers of the OSI model does ethernet operate?
Switch
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. physical layer b. DLL layer
OTDR
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests