SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What layer encapsulates segments into packets?
Identify processes or services that are communicating with end devices.
Originate data flow.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Network Layer
2. 3 measures of data transfer
Signal loss can be experienced.
A. goodput b. throughput c. bandwidth
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Time-to-live (TTL)
3. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. router b. firewall
172.16.192.160
It does not support encryption.
4. What are 2 forms of application layer software?
A physical topology.
Static
Destination Network Address
A. application b. services
5. What makes fiber preferable to copper for interconnecting buildings?
Flash
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. the router will discard the packet b. the router will send a time exceeded message to the source host
The magnetic field around the adjacent pairs of wire.
6. What is the role of MTA in handling email?
Hub
A. media sharing b. logical topology
Transport
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
7. Why are port numbers included in the TCP header of a segment?
To enable a receiving host to forward the data to the appropriate application.
Source and Destination IP address
A. minimizing of collisions b. division into broadcast domains
Static
8. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
255.255.255.0
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Create signals that represent the bits in each frame for the media.
9. What are 3 common problems w/ large networks?
To prevent the receiver from being overwhelmed by incoming data.
It uses support from the lower layers to distinguish between connections to the service.
A. perform degradation b. security issues c. host identification
8
10. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
It reduces unnecessary broadcasts.
Network Layer Packet
No collisions will occur on this link.
TCP initializes the sequence numbers for the sessions.
11. How does the application layer on a server process multiple client requests for services?
Collisions can decrease network performance.
It uses support from the lower layers to distinguish between connections to the service.
A. replace a switch w/ a router b. subnet the new networks
SMB
12. What is a protocol that provides connectionless network layer services?
IP Protocol
Originate data flow.
Window Size
A. replace a switch w/ a router b. subnet the new networks
13. Which 2 options represent Layer 4 addressing?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Window Size
Source and Destination IP address
IP is not properly installed
14. What application layer protocol is used to support file transfers between client and server?
FTP
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Static
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
15. What do the intermediary devices in the network do?
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Is a layer of specific encapsulation.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
16. What are 3 properties of contention-based media access for a shared media?
A. DB 60 b. Winchester 15-pin c. smart serial
UDP
A. non-deterministic b. less overhead c. collisions exist
8
17. To make a console connection from a comp to a Cisco router - what cable should be used?
Rollover cable
A default gateway (router).
Source and Destination IP address
It provides for the exchange of data over a common local media.
18. What do end devices do?
When connecting a host to a switch.
Create signals that represent the bits in each frame for the media.
Originate data flow.
Network
19. During a TCP session - if packets arrive out of order - what will happen?
A. performance degradation b. security issues c. host identification
Supports error detection.
The magnetic field around the adjacent pairs of wire.
The packets will be delivered and reassembled at destination.
20. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
IP is not properly installed
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
80 (HTTP)
21. At which layer of the TCP/IP model does ethernet operate?
Network Access
Router(config)# hostname Costas
Console interface
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
22. What is the purpose of the TCP/IP Network Application Layer?
Hosts return to listen-before-transmit mode.
RJ-45
Network Media Control
A. perform degradation b. security issues c. host identification
23. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
80 (HTTP)
A. larger address space b. data types and classes of service c. authentication and encryption
Router(config)# interface FastEthernet 0/1
Console
24. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
Identify processes or services that are communicating with end devices.
A. replace a switch w/ a router b. subnet the new networks
A. Physical b. Data Link
A. Cat5 UTP b. Cat6 UTP
25. Which device is used to create or divide broadcast domains?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Router
A. media sharing b. logical topology
A. hot keys b. context-sensitive c. command syntax check
26. What is a characteristic of a logical point-to-point topology?
The MAC protocol can be very simple.
As the commands are entered.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. application b. services
27. What is an automated service that matches resource names w/ required IP addresses?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. replace a switch w/ a router b. subnet the new networks
Supports error detection.
DNS
28. What command can be used to determine if the router has experienced any input or output errors?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Show Interfaces
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. physical layer b. DLL layer
29. 3 factors that should be considered when implementing Layer 2 protocols
Network address
2046
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Create signals that represent the bits in each frame for the media.
30. What is the primary rope of the physical layer in transmitting data?
Create signals that represent the bits in each frame for the media.
A. physical layer b. DLL layer
OTDR
The physical address is added.
31. 2 characteristics of peer-2-peer
As the commands are entered.
A. hot keys b. context-sensitive c. command syntax check
A. servers b. routers c. network printers
A. decentralized resources b. resource sharing w/o a dedicated server
32. 2 functions of encapsulation
Destination is not contacted before a packet is sent.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
33. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
IP is not properly installed
Source and Destination Ports
A. decentralized resources b. resource sharing w/o a dedicated server
Any device whose backoff timer expires first.
34. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. next-hop b. metric/interface c. destination network address
A. application b. services
SMB
Network address
35. Where is the IOS file stored at?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Flash
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
36. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Binary ANDing
The MAC protocol can be very simple.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
37. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
Destination is not contacted before a packet is sent.
It uses support from the lower layers to distinguish between connections to the service.
As the commands are entered.
Network address
38. What is the primary reason for developing IPv6?
It has expanded adressing capabilities.
Console interface
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. decentralized resources b. resource sharing w/o a dedicated server
39. What device can check for faults - integrity and performance of media?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. Physical b. Data Link
OTDR
40. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
UTP
2046
A random delay helps prevent the stations from experiencing another collision during transmission.
The destination host address.
41. What type of routing uses information that is manually entered into the routing table?
A. Physical b. Data Link
A. Cat5 UTP b. Cat6 UTP
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Static
42. 2 most commonly used media types in ethernet networks
A. copper UTP b. optical fiber
A. DNS b. SMTP c. POP
Supports error detection.
Rollover cable
43. When destination network is not in the routing table - What are 2 actions the router might take?
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Console interface
Router(config)# hostname Costas
44. Which portion of the network layer address does a router use to forward packets?
A. netstat -r b. route PRINT
Network portion
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Console interface
45. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
0 to 1023
A. show startup-config b. show running-config
Transport
Destination Network Address
46. When do changes take effect in a Cisco router?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Destination is not contacted before a packet is sent.
As the commands are entered.
TCP initializes the sequence numbers for the sessions.
47. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
A. non-deterministic b. less overhead c. collisions exist
Any device whose backoff timer expires first.
Hosts return to listen-before-transmit mode.
Source and Destination IP address
48. What are 2 protocols for transfering web resources?
0 to 1023
A. HTTP b. HTTPS
Window Size
A. application b. presentation c. session d. transmision e. network f. data link g. physical
49. What causes crosstalk within cable pairs when using UTP?
Any device whose backoff timer expires first.
The magnetic field around the adjacent pairs of wire.
A. MTA b. SMTP
A. hot keys b. context-sensitive c. command syntax check
50. What is a disadvantage of Telnet?
OTDR
A. hot keys b. context-sensitive c. command syntax check
It does not support encryption.
Network Media Control