SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An admin needs to keep contents private - which access method should he use?
SSH
Physical
MAC
The MAC protocol can be very simple.
2. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
UDP
Next-Hop Address
A. DNS b. SMTP c. POP
A. DB 60 b. Winchester 15-pin c. smart serial
3. After an ethernet collision - which device has priority to transmit data?
Any device whose backoff timer expires first.
It has expanded adressing capabilities.
It provides for the exchange of data over a common local media.
Is used by the server to resolve names.
4. In a connectionless system - What is correct?
To facilitate the entry and exit of data on media.
A. DNS b. SMTP c. POP
Console
Destination is not contacted before a packet is sent.
5. Which characteristics describe fiber optic cable?
Binary ANDing
Logical Link Control sublayer
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Source and Destination Ports
6. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
A. non-deterministic b. less overhead c. collisions exist
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Physical
It does not support encryption.
7. What are 2 features of User Diagram Protocol (UDP)?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Source Port
A. low overhead b. connectionless
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
8. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
80 (HTTP)
To enable a receiving host to forward the data to the appropriate application.
Network Media Control
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
9. What is an effect of improperly applying a network cable connector?
Signal loss can be experienced.
A. it has centralized administration b. security is easier to enforce
172.16.192.160
255.255.255.224
10. What is the role of MTA in handling email?
Ctrl + Shift + 6
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Destination Network Address
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
11. What are the advantages of using a client-server model?
Binary ANDing
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. it has centralized administration b. security is easier to enforce
It provides for the exchange of data over a common local media.
12. What is the purpose of the TCP/IP Network Application Layer?
Network Media Control
To facilitate the entry and exit of data on media.
As the commands are entered.
Hosts return to listen-before-transmit mode.
13. 3 characteristics of valid Ethernet Layer 2 addresses
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A random delay helps prevent the stations from experiencing another collision during transmission.
A. replace a switch w/ a router b. subnet the new networks
14. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
Router
As the commands are entered.
Host mobility
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
15. 3 properties of peer-2-peer applications
Network Media Control
Show Interfaces
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
OTDR
16. What is a benefit of a WAN?
They must wait until the first hosts finish transfering the media.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Host mobility
17. What are 3 pieces of info about a route contained in a routing table?
A. minimizing of collisions b. division into broadcast domains
A. next-hop b. metric/interface c. destination network address
Console
Hosts return to listen-before-transmit mode.
18. What event occurs during the 3-way handshake?
A. performance degradation b. security issues c. host identification
The packets will be delivered and reassembled at destination.
A. HTTP b. HTTPS
TCP initializes the sequence numbers for the sessions.
19. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
SMB
A default gateway (router).
Console interface
Ctrl + Shift + 6
20. What can be a problem that is reduced by adding end-to-end addressing?
A. MTA b. SMTP
Ctrl + Shift + 6
It reduces unnecessary broadcasts.
Window Size
21. What is a drawback of the CSMA/CD access method?
A. physical layer b. DLL layer
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Collisions can decrease network performance.
255.255.255.224
22. How does the application layer on a server process multiple client requests for services?
Router
Flash
255.255.255.0
It uses support from the lower layers to distinguish between connections to the service.
23. What causes crosstalk within cable pairs when using UTP?
The magnetic field around the adjacent pairs of wire.
A. show startup-config b. show running-config
Is a layer of specific encapsulation.
A. decentralized resources b. resource sharing w/o a dedicated server
24. What do the intermediary devices in the network do?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. decentralized resources b. resource sharing w/o a dedicated server
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
25. What 2 type of cables would most commonly be used for new runs?
Fiber
A. Cat5 UTP b. Cat6 UTP
Router
A. low overhead b. connectionless
26. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
To facilitate the entry and exit of data on media.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Hub
DNS
27. Which portion of the network layer address does a router use to forward packets?
A. purpose b. geographic location c. ownership
Host A
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Network portion
28. What is the primary purpose of Layer 4?
Identify processes or services that are communicating with end devices.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
UDP
Is a layer of specific encapsulation.
29. What command is used to change the default name to 'Costas'?
Logical Link Control sublayer
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Router(config)# hostname Costas
The destination host address.
30. What layer encapsulates segments into packets?
Network Media Control
Fiber
Network Layer
Source and Destination Ports
31. 3 terms that define the forms of help available within the Cisco IOS
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Originate data flow.
A. hot keys b. context-sensitive c. command syntax check
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
32. What information is added during encapsulation at OSI Layer 3?
Router
Network Media Control
Source Port
Source and Destination IP address
33. What is the function of the DLL?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
They must wait until the first hosts finish transfering the media.
Source Port
It provides for the exchange of data over a common local media.
34. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
Application Layer
Window Size
RJ-45
Network Layer Packet
35. What do you need to use for an initial configuration on a Cisco router?
Application Layer
Network Layer
Console interface
No collisions will occur on this link.
36. What is the purpose of the preamble in an ethernet frame?
A. DB 60 b. Winchester 15-pin c. smart serial
Signal loss can be experienced.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
37. Which device is used to create or divide broadcast domains?
Time-to-live (TTL)
Router
A. HTTP b. HTTPS
Logical Link Control sublayer
38. Intermediary devices used to implement security between networks
Flash
FTP
Hosts return to listen-before-transmit mode.
A. router b. firewall
39. What is a protocol that provides connectionless network layer services?
To enable a receiving host to forward the data to the appropriate application.
IP Protocol
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
40. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
It provides interface between applications on either end of the network.
It reduces unnecessary broadcasts.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Transport
41. Group of hosts that have identical bit patterns in the high order bits of their addresses
It uses lasers as the light source.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Network
Twisting of the cables
42. 3 facts about the network portion of an IPv4 address
Source and Destination IP address
MAC
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
No collisions will occur on this link.
43. 2 functions of encapsulation
Static
A. performance degradation b. security issues c. host identification
A. hot keys b. context-sensitive c. command syntax check
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
44. When is a straight-through cable used in a network?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
When connecting a host to a switch.
A. application b. services
45. To make a console connection from a comp to a Cisco router - what cable should be used?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Network Layer
Rollover cable
255.255.255.224
46. At which layer of the TCP/IP model does ethernet operate?
Network Access
A. show startup-config b. show running-config
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. Cat5 UTP b. Cat6 UTP
47. What is the primary function of encapsulating packets into frames?
Destination Network Address
Static
A. minimizing of collisions b. division into broadcast domains
To facilitate the entry and exit of data on media.
48. What are 2 forms of application layer software?
Switch
OTDR
A. application b. services
Destination Network Address
49. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. DB 60 b. Winchester 15-pin c. smart serial
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
255.255.255.0
50. What determines the method of media access control?
The packets will be delivered and reassembled at destination.
A. media sharing b. logical topology
Physical
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks