SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are 2 common characteristics associated w/ dynamic routing protocols?
Binary ANDing
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Hosts return to listen-before-transmit mode.
A. they initiate data exchanges b. they may upload data to servers
2. What kind of problems are caused by excessive broadcast traffic on network segments?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Twisting of the cables
Identify processes or services that are communicating with end devices.
Console
3. Network Protocols
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
UTP
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Signal loss can be experienced.
4. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
RJ-45
Source and Destination Ports
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. not affected by EMI of RFI b. most expensive type of LAN cabling
5. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
Router
Network Layer Packet
80 (HTTP)
It uses lasers as the light source.
6. What is the purpose of resource records in DNS?
32 bits
A. goodput b. throughput c. bandwidth
Is used by the server to resolve names.
Next-Hop Address
7. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
Signal loss can be experienced.
IP is not properly installed
Fiber
Destination is not contacted before a packet is sent.
8. 3 factors that should be considered when implementing Layer 2 protocols
Collisions can decrease network performance.
Console
A. physical layer b. DLL layer
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
9. What 2 type of cables would most commonly be used for new runs?
A. Cat5 UTP b. Cat6 UTP
A. show startup-config b. show running-config
SSH
172.16.192.160
10. statements of IP adressing
It uses support from the lower layers to distinguish between connections to the service.
To enable a receiving host to forward the data to the appropriate application.
Rollover cable
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
11. After an ethernet collision - which device has priority to transmit data?
It uses lasers as the light source.
Any device whose backoff timer expires first.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
12. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. What info is found in the TCP and UDP header info?
It has expanded adressing capabilities.
Source and Destination Ports
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. the router will discard the packet b. the router will send a time exceeded message to the source host
14. Default Gateway is incorrect on the host - What is the impact on the communications?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Host A
The physical address is added.
15. What do the intermediary devices in the network do?
The MAC protocol can be very simple.
A. perform degradation b. security issues c. host identification
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
16. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
Create signals that represent the bits in each frame for the media.
It reduces unnecessary broadcasts.
Switch
Resolve IPv4 addresses to MAC addresses.
17. Which portion of the network layer address does a router use to forward packets?
Network Layer
The packets will be delivered and reassembled at destination.
Network portion
A. media sharing b. logical topology
18. What networking devices are recommended to be assigned static IP addresses?
Twisting of the cables
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. servers b. routers c. network printers
19. What are key considering factors when grouping hosts into common networks?
A. purpose b. geographic location c. ownership
It has expanded adressing capabilities.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Console
20. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
Rollover cable
Hub
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
21. What can be a problem that is reduced by adding end-to-end addressing?
A. performance degradation b. security issues c. host identification
Network Layer Packet
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
It reduces unnecessary broadcasts.
22. What application layer protocol is used to support file transfers between client and server?
Is a layer of specific encapsulation.
FTP
A. servers b. routers c. network printers
A random delay helps prevent the stations from experiencing another collision during transmission.
23. What are 2 forms of application layer software?
FTP
A. application b. services
Application Layer
Twisting of the cables
24. Which IP packet field will prevent endless loops?
Time-to-live (TTL)
A. copper UTP b. optical fiber
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Ctrl + Shift + 6
25. What causes crosstalk within cable pairs when using UTP?
A. enable mode b. priviledge executive mode
Resolve IPv4 addresses to MAC addresses.
The magnetic field around the adjacent pairs of wire.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
26. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
Time-to-live (TTL)
UTP
Destination is not contacted before a packet is sent.
They must wait until the first hosts finish transfering the media.
27. What is a benefit of a WAN?
Hub
Host mobility
A default gateway (router).
2046
28. What is the purpose of the TCP/IP Network Application Layer?
Network Media Control
A. flow control b. session establishment c. numbering and sequencing
UDP
Switch
29. What method of signal transmission uses radio waves to carry signals?
A. addressing b. error detection c. frame delimiting
SMB
A backbone cable.
Wireless
30. 3 statements of media acess control
Is a layer of specific encapsulation.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Flash
It does not support encryption.
31. Which type of cable is most often associated w/ fiber-optic cable?
A backbone cable.
To prevent the receiver from being overwhelmed by incoming data.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
It uses lasers as the light source.
32. 3 features that allow TCP to realibly and accurately track the transmission of data
A. Cat5 UTP b. Cat6 UTP
A backbone cable.
A. flow control b. session establishment c. numbering and sequencing
The MAC protocol can be very simple.
33. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
2046
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
The magnetic field around the adjacent pairs of wire.
OTDR
34. How does the application layer on a server process multiple client requests for services?
255.255.255.0
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Host A
It uses support from the lower layers to distinguish between connections to the service.
35. What describes the purpose of default route?
Resolve IPv4 addresses to MAC addresses.
A. show startup-config b. show running-config
Identify the device that allows local network computers to communicate w/ devices in other networks.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
36. Which combination of keys can be used to interrupt a ping or traceroute process?
It does not support encryption.
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Ctrl + Shift + 6
Network address
37. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Hosts return to listen-before-transmit mode.
Source and Destination IP address
A. show startup-config b. show running-config
A. media sharing b. logical topology
38. What is the purpose of a default gateway?
Any device whose backoff timer expires first.
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. perform degradation b. security issues c. host identification
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
39. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
DNS
A. larger address space b. data types and classes of service c. authentication and encryption
SMB
40. 3 properties of peer-2-peer applications
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
IP Protocol
A. show startup-config b. show running-config
A. DNS b. SMTP c. POP
41. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
A. servers b. routers c. network printers
A. the router will discard the packet b. the router will send a time exceeded message to the source host
As the commands are entered.
Host A
42. 3 common problems w/ a large network
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. performance degradation b. security issues c. host identification
UTP
Switch
43. In business LANs - which connector is used w/ twisted-pair networking cable?
RJ-45
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Rollover cable
8
44. What is the primary rope of the physical layer in transmitting data?
A. it has centralized administration b. security is easier to enforce
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. HTTP b. HTTPS
Create signals that represent the bits in each frame for the media.
45. Intermediary devices used to implement security between networks
A. router b. firewall
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
255.255.255.224
Console interface
46. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
Any device whose backoff timer expires first.
255.255.255.0
A. Physical b. Data Link
A backbone cable.
47. What are the advantages of using a client-server model?
Console
A. it has centralized administration b. security is easier to enforce
Rollover cable
A. copper UTP b. optical fiber
48. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
Next-Hop Address
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
255.255.255.0
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
49. What is an effect of improperly applying a network cable connector?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. performance degradation b. security issues c. host identification
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Signal loss can be experienced.
50. When destination network is not in the routing table - What are 2 actions the router might take?
Network portion
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Signal loss can be experienced.
A. purpose b. geographic location c. ownership