SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 3 statements of media acess control
Originate data flow.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
172.16.192.160
It reduces unnecessary broadcasts.
2. Intermediary devices used to implement security between networks
A. router b. firewall
SSH
Router(config)# hostname Costas
Supports error detection.
3. How does the application layer on a server process multiple client requests for services?
A. show startup-config b. show running-config
To facilitate the entry and exit of data on media.
A. copper UTP b. optical fiber
It uses support from the lower layers to distinguish between connections to the service.
4. When is a straight-through cable used in a network?
Host A
Minimal delays in data delivery.
Network
When connecting a host to a switch.
5. 3 measures of data transfer
0 to 1023
As the commands are entered.
32 bits
A. goodput b. throughput c. bandwidth
6. Which characteristics describe fiber optic cable?
It uses lasers as the light source.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Create signals that represent the bits in each frame for the media.
A. they initiate data exchanges b. they may upload data to servers
7. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Identify processes or services that are communicating with end devices.
A. show startup-config b. show running-config
Binary ANDing
8. What is a protocol that provides connectionless network layer services?
To enable a receiving host to forward the data to the appropriate application.
8
SSH
IP Protocol
9. What do the intermediary devices in the network do?
Resolve IPv4 addresses to MAC addresses.
Rollover cable
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Show Interfaces
10. 3 characteristics of valid Ethernet Layer 2 addresses
Window Size
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
11. What type of network cable is used between a terminal and a console port?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Rollover cable
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
12. What is the role of the OSI Application Layer?
It has expanded adressing capabilities.
A. decentralized resources b. resource sharing w/o a dedicated server
It provides interface between applications on either end of the network.
Network Media Control
13. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
IP is not properly installed
SMB
Twisting of the cables
A. flow control b. session establishment c. numbering and sequencing
14. 2 features that make switches preferable to hubs
Twisting of the cables
A. minimizing of collisions b. division into broadcast domains
It reduces unnecessary broadcasts.
It provides interface between applications on either end of the network.
15. What event occurs during the 3-way handshake?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. the router will discard the packet b. the router will send a time exceeded message to the source host
TCP initializes the sequence numbers for the sessions.
172.16.192.160
16. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
RJ-45
A. next-hop b. metric/interface c. destination network address
Physical
Network portion
17. Why are port numbers included in the TCP header of a segment?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
To enable a receiving host to forward the data to the appropriate application.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Router(config)# hostname Costas
18. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
They must wait until the first hosts finish transfering the media.
The destination host address.
Network Layer
Transport
19. 3 factors that should be considered when implementing Layer 2 protocols
A. low overhead b. connectionless
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Minimal delays in data delivery.
Console
20. 3 statements about the role of routers in the network
A. low overhead b. connectionless
A. it has centralized administration b. security is easier to enforce
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
The destination host address.
21. Default Gateway is incorrect on the host - What is the impact on the communications?
Network
A. addressing b. error detection c. frame delimiting
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Window Size
22. What info is found in the TCP and UDP header info?
Physical
Source and Destination Ports
To prevent the receiver from being overwhelmed by incoming data.
RJ-45
23. What can be a problem that is reduced by adding end-to-end addressing?
A. DB 60 b. Winchester 15-pin c. smart serial
It reduces unnecessary broadcasts.
172.16.192.160
Transport
24. When destination network is not in the routing table - What are 2 actions the router might take?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
The MAC protocol can be very simple.
The address of the router that the host will use to 'get to the other side'.
25. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
SSH
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Network Access
26. When a device is moved from one network to the other...?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
No collisions will occur on this link.
Host mobility
27. 3 features that allow TCP to realibly and accurately track the transmission of data
Network portion
80 (HTTP)
A. flow control b. session establishment c. numbering and sequencing
SSH
28. What are 3 common problems w/ large networks?
Twisting of the cables
UDP
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. perform degradation b. security issues c. host identification
29. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
Hub
Rollover cable
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Binary ANDing
30. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
255.255.255.0
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
31. What are 2 email components used to forward mail between servers?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. MTA b. SMTP
The MAC protocol can be very simple.
Host A
32. What are 2 forms of application layer software?
A. application b. services
A. DB 60 b. Winchester 15-pin c. smart serial
Rollover cable
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
33. What networking devices are recommended to be assigned static IP addresses?
The physical address is added.
A. servers b. routers c. network printers
Router
Ctrl + Shift + 6
34. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
80 (HTTP)
Collisions can decrease network performance.
Network portion
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
35. Why is flow control used for TCP data transfer?
Console
Time-to-live (TTL)
To prevent the receiver from being overwhelmed by incoming data.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
36. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
A. router b. firewall
2046
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Logical Link Control sublayer
37. What is the primary purpose of ARP?
Resolve IPv4 addresses to MAC addresses.
A backbone cable.
A. Physical b. Data Link
Hub
38. statements of IP adressing
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. larger address space b. data types and classes of service c. authentication and encryption
A. goodput b. throughput c. bandwidth
39. What are the advantages of using a client-server model?
A. perform degradation b. security issues c. host identification
A. goodput b. throughput c. bandwidth
A. it has centralized administration b. security is easier to enforce
Source and Destination IP address
40. If the router says: 'Switch-East4#' What identifies the CLI mode represented?
A. minimizing of collisions b. division into broadcast domains
Rollover cable
Router(config)# hostname Costas
A. enable mode b. priviledge executive mode
41. What type of routing uses information that is manually entered into the routing table?
Static
UTP
A. decentralized resources b. resource sharing w/o a dedicated server
Rollover cable
42. There are too many broadcasts on switches - what can be done?
To facilitate the entry and exit of data on media.
A. replace a switch w/ a router b. subnet the new networks
255.255.255.0
Rollover cable
43. In a connectionless system - What is correct?
A. MTA b. SMTP
A. identifies the communicating applications b. identifies multiple conversations between the hosts
The destination host address.
Destination is not contacted before a packet is sent.
44. 2 characteristics of peer-2-peer
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. decentralized resources b. resource sharing w/o a dedicated server
A. identifies the communicating applications b. identifies multiple conversations between the hosts
When connecting a host to a switch.
45. What statements describe the logical token-passing topology?
The destination host address.
Network Access
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
As the commands are entered.
46. What is a disadvantage of Telnet?
It does not support encryption.
2046
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Host A
47. What is the function of the DLL?
FTP
It provides for the exchange of data over a common local media.
A backbone cable.
A. enable mode b. priviledge executive mode
48. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
Router(config)# interface FastEthernet 0/1
A. show startup-config b. show running-config
Console interface
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
49. To make a console connection from a comp to a Cisco router - what cable should be used?
To enable a receiving host to forward the data to the appropriate application.
Rollover cable
It uses support from the lower layers to distinguish between connections to the service.
A. performance degradation b. security issues c. host identification
50. What can you identify when you examine the Network Layer header?
SMB
Any device whose backoff timer expires first.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
The destination host address.