SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are 2 forms of application layer software?
A. application b. services
A. HTTP b. HTTPS
Destination Network Address
8
2. 3 properties of peer-2-peer applications
A. larger address space b. data types and classes of service c. authentication and encryption
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Network Access
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
3. What is the purpose of resource records in DNS?
A backbone cable.
Console interface
A. DB 60 b. Winchester 15-pin c. smart serial
Is used by the server to resolve names.
4. What is a disadvantage of Telnet?
It does not support encryption.
A. Physical b. Data Link
Signal loss can be experienced.
Any device whose backoff timer expires first.
5. 3 common problems w/ a large network
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A random delay helps prevent the stations from experiencing another collision during transmission.
Physical
A. performance degradation b. security issues c. host identification
6. What is a characteristic of a logical point-to-point topology?
Network address
The MAC protocol can be very simple.
OTDR
No collisions will occur on this link.
7. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
Source Port
It provides interface between applications on either end of the network.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
255.255.255.0
8. What characteristic of an UTP helps reduce interference?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Show Interfaces
255.255.255.0
Twisting of the cables
9. What makes fiber preferable to copper for interconnecting buildings?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
8
A. MTA b. SMTP
10. 2 characteristics of peer-2-peer
The packets will be delivered and reassembled at destination.
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Resolve IPv4 addresses to MAC addresses.
A. decentralized resources b. resource sharing w/o a dedicated server
11. What are 3 common problems w/ large networks?
A. non-deterministic b. less overhead c. collisions exist
A. perform degradation b. security issues c. host identification
A. next-hop b. metric/interface c. destination network address
It uses support from the lower layers to distinguish between connections to the service.
12. What are 3 properties of contention-based media access for a shared media?
Host mobility
A. non-deterministic b. less overhead c. collisions exist
Identify processes or services that are communicating with end devices.
Originate data flow.
13. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
It provides interface between applications on either end of the network.
SMB
Switch
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
14. There are too many broadcasts on switches - what can be done?
A. replace a switch w/ a router b. subnet the new networks
A. enable mode b. priviledge executive mode
A. DNS b. SMTP c. POP
It reduces unnecessary broadcasts.
15. What is the purpose of the preamble in an ethernet frame?
Network Access
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Destination is not contacted before a packet is sent.
To enable a receiving host to forward the data to the appropriate application.
16. 3 primary functions of the data link layer encapsulation
Next-Hop Address
Static
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. addressing b. error detection c. frame delimiting
17. 3 characteristics of valid Ethernet Layer 2 addresses
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
8
Router
Ctrl + Shift + 6
18. What is the primary reason for developing IPv6?
It has expanded adressing capabilities.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. router b. firewall
A. show startup-config b. show running-config
19. What command can be used to determine if the router has experienced any input or output errors?
Show Interfaces
A default gateway (router).
A. HTTP b. HTTPS
UTP
20. What does the IEEE 802.2 standard represent in Ethernet technologies?
A. flow control b. session establishment c. numbering and sequencing
80 (HTTP)
Signal loss can be experienced.
Logical Link Control sublayer
21. Important characteristic of UDP
Minimal delays in data delivery.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
The magnetic field around the adjacent pairs of wire.
UTP
22. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
Binary ANDing
It provides for the exchange of data over a common local media.
Any device whose backoff timer expires first.
Network Layer
23. What are 2 protocols for transfering web resources?
A. HTTP b. HTTPS
Network Access
2046
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
24. What is the primary purpose of ARP?
Router(config)# interface FastEthernet 0/1
A. flow control b. session establishment c. numbering and sequencing
A. larger address space b. data types and classes of service c. authentication and encryption
Resolve IPv4 addresses to MAC addresses.
25. 3 protocols that operate in the application layer
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
It uses lasers as the light source.
A. DNS b. SMTP c. POP
A default gateway (router).
26. What is dinamically selected by the source host when forwarding data?
Collisions can decrease network performance.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Source Port
27. What layer encapsulates segments into packets?
Network Layer
It does not support encryption.
Collisions can decrease network performance.
It has expanded adressing capabilities.
28. What is a characteristic of a single-mode fiber-optic cable?
Collisions can decrease network performance.
It uses lasers as the light source.
The address of the router that the host will use to 'get to the other side'.
255.255.255.0
29. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
Fiber
A. DNS b. SMTP c. POP
They must wait until the first hosts finish transfering the media.
Router
30. When is a straight-through cable used in a network?
A. replace a switch w/ a router b. subnet the new networks
A. they initiate data exchanges b. they may upload data to servers
When connecting a host to a switch.
A. purpose b. geographic location c. ownership
31. What are 2 common characteristics associated w/ dynamic routing protocols?
Static
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Originate data flow.
32. Which portion of the network layer address does a router use to forward packets?
Network portion
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Supports error detection.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
33. Intermediary devices used to implement security between networks
A. router b. firewall
The packets will be delivered and reassembled at destination.
As the commands are entered.
MAC
34. What is the primary function of encapsulating packets into frames?
To facilitate the entry and exit of data on media.
Resolve IPv4 addresses to MAC addresses.
Ctrl + Shift + 6
80 (HTTP)
35. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
8
A. HTTP b. HTTPS
Transport
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
36. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
A. application b. services
2046
A. purpose b. geographic location c. ownership
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
37. 3 features of IPv6
Console interface
It uses lasers as the light source.
The MAC protocol can be very simple.
A. larger address space b. data types and classes of service c. authentication and encryption
38. How many bits make up an IPv4 address?
32 bits
Destination Network Address
A. performance degradation b. security issues c. host identification
A. Physical b. Data Link
39. 2 characteristics of clients in data networks
A. they initiate data exchanges b. they may upload data to servers
FTP
When connecting a host to a switch.
Rollover cable
40. Statements that describe LAN
Rollover cable
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Switch
Network Layer Packet
41. What is the role of MTA in handling email?
Wireless
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
OTDR
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
42. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
Switch
It provides interface between applications on either end of the network.
Next-Hop Address
Network Media Control
43. What is an automated service that matches resource names w/ required IP addresses?
DNS
Physical
Static
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
44. What info is found in the TCP and UDP header info?
The magnetic field around the adjacent pairs of wire.
Source and Destination Ports
A. media sharing b. logical topology
Destination Network Address
45. Which 2 options represent Layer 4 addressing?
Is a layer of specific encapsulation.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A random delay helps prevent the stations from experiencing another collision during transmission.
46. What is PDU?
The destination host address.
SMB
Is a layer of specific encapsulation.
A random delay helps prevent the stations from experiencing another collision during transmission.
47. If you have a full-duplex operational network - what can happen?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Switch
Show Interfaces
No collisions will occur on this link.
48. 3 factors that should be considered when implementing Layer 2 protocols
A. netstat -r b. route PRINT
It does not support encryption.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
49. 3 features that allow TCP to realibly and accurately track the transmission of data
255.255.255.0
A. flow control b. session establishment c. numbering and sequencing
Static
Destination is not contacted before a packet is sent.
50. What causes crosstalk within cable pairs when using UTP?
Minimal delays in data delivery.
A. low overhead b. connectionless
32 bits
The magnetic field around the adjacent pairs of wire.