SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
Host A
A physical topology.
A. copper UTP b. optical fiber
A. HTTP b. HTTPS
2. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
To prevent the receiver from being overwhelmed by incoming data.
SMB
Logical Link Control sublayer
A. low overhead b. connectionless
3. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
RJ-45
Supports error detection.
A. replace a switch w/ a router b. subnet the new networks
Collisions can decrease network performance.
4. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Rollover cable
Flash
Destination Network Address
Network Access
5. 3 features of IPv6
Fiber
It provides interface between applications on either end of the network.
A. larger address space b. data types and classes of service c. authentication and encryption
A. DB 60 b. Winchester 15-pin c. smart serial
6. What type of network cable is used between a terminal and a console port?
Rollover cable
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Console
Next-Hop Address
7. What is the primary purpose of ARP?
Resolve IPv4 addresses to MAC addresses.
32 bits
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
8. What is the role of MTA in handling email?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Network address
It does not support encryption.
Supports error detection.
9. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
A. netstat -r b. route PRINT
Network Layer Packet
A. Physical b. Data Link
Network Access
10. If there is a graphic representation of a company network wiring and equipment - What is this called?
A. low overhead b. connectionless
A physical topology.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. media sharing b. logical topology
11. 3 statements of media acess control
Logical Link Control sublayer
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
12. What is a characteristic of a single-mode fiber-optic cable?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
It uses lasers as the light source.
DNS
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
13. What is an effect of improperly applying a network cable connector?
It uses support from the lower layers to distinguish between connections to the service.
Transport
Signal loss can be experienced.
Logical Link Control sublayer
14. What statements describe the logical token-passing topology?
A. servers b. routers c. network printers
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
15. What is a component of a routing table entry?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. low overhead b. connectionless
Next-Hop Address
16. When is a straight-through cable used in a network?
A. replace a switch w/ a router b. subnet the new networks
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. it has centralized administration b. security is easier to enforce
When connecting a host to a switch.
17. What is the function of the DLL?
Console interface
Source and Destination IP address
A. goodput b. throughput c. bandwidth
It provides for the exchange of data over a common local media.
18. Why are port numbers included in the TCP header of a segment?
No collisions will occur on this link.
A. decentralized resources b. resource sharing w/o a dedicated server
To enable a receiving host to forward the data to the appropriate application.
Collisions can decrease network performance.
19. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
A. show startup-config b. show running-config
RJ-45
Network Layer Packet
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
20. At which layer of the TCP/IP model does ethernet operate?
Next-Hop Address
A. non-deterministic b. less overhead c. collisions exist
They must wait until the first hosts finish transfering the media.
Network Access
21. If you have a full-duplex operational network - what can happen?
No collisions will occur on this link.
UTP
The MAC protocol can be very simple.
The address of the router that the host will use to 'get to the other side'.
22. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Logical Link Control sublayer
255.255.255.0
23. 2 characteristics of clients in data networks
Ctrl + Shift + 6
A. they initiate data exchanges b. they may upload data to servers
A. physical layer b. DLL layer
RJ-45
24. What can be a problem that is reduced by adding end-to-end addressing?
It reduces unnecessary broadcasts.
Console
A. hot keys b. context-sensitive c. command syntax check
IP is not properly installed
25. When do changes take effect in a Cisco router?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
As the commands are entered.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Identify processes or services that are communicating with end devices.
26. What are 3 common problems w/ large networks?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. addressing b. error detection c. frame delimiting
A. perform degradation b. security issues c. host identification
A. application b. services
27. Important characteristic of UDP
A. enable mode b. priviledge executive mode
Minimal delays in data delivery.
The packets will be delivered and reassembled at destination.
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
28. What does the IEEE 802.2 standard represent in Ethernet technologies?
UTP
Signal loss can be experienced.
A default gateway (router).
Logical Link Control sublayer
29. When a network service fails - which port is most often used to access a router for management purposes?
Console
Router(config)# hostname Costas
Identify the device that allows local network computers to communicate w/ devices in other networks.
RJ-45
30. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Network address
Physical
A. physical layer b. DLL layer
31. How many bits make up an IPv4 address?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
32 bits
32. What is the purpose of the preamble in an ethernet frame?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Router(config)# interface FastEthernet 0/1
172.16.192.160
To enable a receiving host to forward the data to the appropriate application.
33. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
OTDR
Window Size
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
34. During a TCP session - if packets arrive out of order - what will happen?
The destination host address.
The packets will be delivered and reassembled at destination.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. perform degradation b. security issues c. host identification
35. 3 terms that define the forms of help available within the Cisco IOS
A. MTA b. SMTP
Is used by the server to resolve names.
When connecting a host to a switch.
A. hot keys b. context-sensitive c. command syntax check
36. 3 protocols that operate in the application layer
It has expanded adressing capabilities.
A. DNS b. SMTP c. POP
A. non-deterministic b. less overhead c. collisions exist
Rollover cable
37. What is a protocol that provides connectionless network layer services?
Network address
Host A
It provides for the exchange of data over a common local media.
IP Protocol
38. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
Is used by the server to resolve names.
255.255.255.224
The address of the router that the host will use to 'get to the other side'.
A. addressing b. error detection c. frame delimiting
39. 3 properties of peer-2-peer applications
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Originate data flow.
Network Layer
They must wait until the first hosts finish transfering the media.
40. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
Source and Destination IP address
2046
Hub
A. servers b. routers c. network printers
41. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
A. HTTP b. HTTPS
Switch
MAC
Collisions can decrease network performance.
42. An admin needs to keep contents private - which access method should he use?
Network Layer Packet
A. performance degradation b. security issues c. host identification
Time-to-live (TTL)
SSH
43. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. addressing b. error detection c. frame delimiting
Time-to-live (TTL)
0 to 1023
44. 2 characteristics of peer-2-peer
A. decentralized resources b. resource sharing w/o a dedicated server
Flash
Network Layer Packet
DNS
45. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
80 (HTTP)
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. performance degradation b. security issues c. host identification
46. What are 2 common characteristics associated w/ dynamic routing protocols?
A. replace a switch w/ a router b. subnet the new networks
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
172.16.192.160
Router(config)# interface FastEthernet 0/1
47. What type of routing uses information that is manually entered into the routing table?
Static
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A. low overhead b. connectionless
A. not affected by EMI of RFI b. most expensive type of LAN cabling
48. What is an automated service that matches resource names w/ required IP addresses?
DNS
A. servers b. routers c. network printers
The MAC protocol can be very simple.
Any device whose backoff timer expires first.
49. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
Binary ANDing
A. goodput b. throughput c. bandwidth
Window Size
It uses support from the lower layers to distinguish between connections to the service.
50. After an ethernet collision - which device has priority to transmit data?
A. non-deterministic b. less overhead c. collisions exist
8
To facilitate the entry and exit of data on media.
Any device whose backoff timer expires first.