SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What connectors are commonly associated w/ Cisco's V.35 serial cables?
Wireless
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. DB 60 b. Winchester 15-pin c. smart serial
Switch
2. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Identify the device that allows local network computers to communicate w/ devices in other networks.
Minimal delays in data delivery.
Physical
Flash
3. During a TCP session - if packets arrive out of order - what will happen?
A. minimizing of collisions b. division into broadcast domains
The packets will be delivered and reassembled at destination.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
DNS
4. 3 features of IPv6
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. larger address space b. data types and classes of service c. authentication and encryption
Network Access
5. What kind of problems are caused by excessive broadcast traffic on network segments?
A. decentralized resources b. resource sharing w/o a dedicated server
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
6. Where is the IOS file stored at?
255.255.255.224
A. netstat -r b. route PRINT
Flash
Resolve IPv4 addresses to MAC addresses.
7. What is the primary purpose of ARP?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Network
Resolve IPv4 addresses to MAC addresses.
UTP
8. What command is used to change the default name to 'Costas'?
Next-Hop Address
Destination Network Address
Router(config)# hostname Costas
A. they initiate data exchanges b. they may upload data to servers
9. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Network address
Wireless
Destination Network Address
It uses support from the lower layers to distinguish between connections to the service.
10. Default Gateway is incorrect on the host - What is the impact on the communications?
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. HTTP b. HTTPS
UDP
When connecting a host to a switch.
11. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
A. MTA b. SMTP
Network address
A. Physical b. Data Link
Collisions can decrease network performance.
12. What is the purpose of the preamble in an ethernet frame?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. media sharing b. logical topology
A. replace a switch w/ a router b. subnet the new networks
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
13. What type of network cable is used between a terminal and a console port?
Rollover cable
A. MTA b. SMTP
Originate data flow.
IP Protocol
14. What is the proper order of the OSI Layers?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. application b. presentation c. session d. transmision e. network f. data link g. physical
15. 3 primary functions of the data link layer encapsulation
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. addressing b. error detection c. frame delimiting
Switch
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
16. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Network
UDP
17. 3 characteristics of valid Ethernet Layer 2 addresses
Source and Destination Ports
UTP
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
18. What event occurs during the 3-way handshake?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
TCP initializes the sequence numbers for the sessions.
A. minimizing of collisions b. division into broadcast domains
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
19. What are 2 features of User Diagram Protocol (UDP)?
Next-Hop Address
255.255.255.224
OTDR
A. low overhead b. connectionless
20. Which characteristics describe fiber optic cable?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. addressing b. error detection c. frame delimiting
Router(config)# hostname Costas
A. copper UTP b. optical fiber
21. What do the intermediary devices in the network do?
Identify processes or services that are communicating with end devices.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
32 bits
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
22. 2 characteristics of peer-2-peer
A. decentralized resources b. resource sharing w/o a dedicated server
A. addressing b. error detection c. frame delimiting
A. router b. firewall
A. application b. presentation c. session d. transmision e. network f. data link g. physical
23. 3 common problems w/ a large network
Create signals that represent the bits in each frame for the media.
Time-to-live (TTL)
A. performance degradation b. security issues c. host identification
Host A
24. What is an effect of improperly applying a network cable connector?
A. they initiate data exchanges b. they may upload data to servers
It has expanded adressing capabilities.
A default gateway (router).
Signal loss can be experienced.
25. How does the application layer on a server process multiple client requests for services?
Resolve IPv4 addresses to MAC addresses.
It uses support from the lower layers to distinguish between connections to the service.
Window Size
A. non-deterministic b. less overhead c. collisions exist
26. What describes the purpose of default route?
Fiber
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A default gateway (router).
Router
27. What method of signal transmission uses radio waves to carry signals?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Wireless
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
No collisions will occur on this link.
28. Which combination of keys can be used to interrupt a ping or traceroute process?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
FTP
Ctrl + Shift + 6
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
29. What is a protocol that provides connectionless network layer services?
IP Protocol
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Console
Hosts return to listen-before-transmit mode.
30. 3 facts about the network portion of an IPv4 address
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Time-to-live (TTL)
Flash
31. What type of routing uses information that is manually entered into the routing table?
Static
2046
Identify the device that allows local network computers to communicate w/ devices in other networks.
Show Interfaces
32. What causes crosstalk within cable pairs when using UTP?
A. decentralized resources b. resource sharing w/o a dedicated server
The magnetic field around the adjacent pairs of wire.
A default gateway (router).
32 bits
33. Which 2 options represent Layer 4 addressing?
Rollover cable
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
The physical address is added.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
34. Why is flow control used for TCP data transfer?
To prevent the receiver from being overwhelmed by incoming data.
TCP initializes the sequence numbers for the sessions.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
It provides interface between applications on either end of the network.
35. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Is a layer of specific encapsulation.
A. replace a switch w/ a router b. subnet the new networks
Hosts return to listen-before-transmit mode.
The MAC protocol can be very simple.
36. What are 3 properties of contention-based media access for a shared media?
A. non-deterministic b. less overhead c. collisions exist
255.255.255.0
Rollover cable
172.16.192.160
37. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Show Interfaces
A. minimizing of collisions b. division into broadcast domains
Time-to-live (TTL)
38. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
Network address
A. they initiate data exchanges b. they may upload data to servers
To facilitate the entry and exit of data on media.
Network portion
39. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
Fiber
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
The address of the router that the host will use to 'get to the other side'.
Create signals that represent the bits in each frame for the media.
40. What characteristic of an UTP helps reduce interference?
Window Size
A. DNS b. SMTP c. POP
Twisting of the cables
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
41. 2 functions of encapsulation
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
SMB
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
42. statements of IP adressing
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
172.16.192.160
To enable a receiving host to forward the data to the appropriate application.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
43. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
Wireless
Fiber
MAC
Physical
44. In business LANs - which connector is used w/ twisted-pair networking cable?
A. non-deterministic b. less overhead c. collisions exist
RJ-45
Physical
A. DNS b. SMTP c. POP
45. Statements that describe LAN
The physical address is added.
It reduces unnecessary broadcasts.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
46. What can get you to an outside network?
Network portion
A default gateway (router).
Signal loss can be experienced.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
47. 3 statements of media acess control
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. Physical b. Data Link
48. 3 measures of data transfer
A. goodput b. throughput c. bandwidth
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. they initiate data exchanges b. they may upload data to servers
OTDR
49. What is dinamically selected by the source host when forwarding data?
Source Port
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. not affected by EMI of RFI b. most expensive type of LAN cabling
0 to 1023
50. 2 characteristics of clients in data networks
Flash
Console interface
A. they initiate data exchanges b. they may upload data to servers
Host A