SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is an automated service that matches resource names w/ required IP addresses?
Show Interfaces
DNS
Host A
The address of the router that the host will use to 'get to the other side'.
2. What is the primary purpose of ARP?
0 to 1023
Resolve IPv4 addresses to MAC addresses.
Minimal delays in data delivery.
A. media sharing b. logical topology
3. 3 statements about routes and their use
Physical
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
No collisions will occur on this link.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
4. What describes the purpose of default route?
A. perform degradation b. security issues c. host identification
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Source and Destination IP address
Console interface
5. What do end devices do?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Signal loss can be experienced.
Originate data flow.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
6. When is a straight-through cable used in a network?
DNS
Router
When connecting a host to a switch.
Any device whose backoff timer expires first.
7. Where is the IOS file stored at?
A. goodput b. throughput c. bandwidth
Flash
Switch
A. decentralized resources b. resource sharing w/o a dedicated server
8. What information is added during encapsulation at OSI Layer 3?
Source and Destination IP address
IP Protocol
Identify processes or services that are communicating with end devices.
Switch
9. What is a characteristic of a single-mode fiber-optic cable?
Network portion
Supports error detection.
It uses lasers as the light source.
Next-Hop Address
10. Which layer supplies services and allows user interface?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Rollover cable
OTDR
Application Layer
11. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. minimizing of collisions b. division into broadcast domains
A. goodput b. throughput c. bandwidth
12. Which portion of the network layer address does a router use to forward packets?
Show Interfaces
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Network portion
Network
13. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
A. router b. firewall
0 to 1023
A backbone cable.
Network Access
14. When do changes take effect in a Cisco router?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
It uses support from the lower layers to distinguish between connections to the service.
The destination host address.
As the commands are entered.
15. What is a drawback of the CSMA/CD access method?
A. decentralized resources b. resource sharing w/o a dedicated server
Create signals that represent the bits in each frame for the media.
The packets will be delivered and reassembled at destination.
Collisions can decrease network performance.
16. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
A. DNS b. SMTP c. POP
Supports error detection.
UDP
Network Access
17. What statements describe the logical token-passing topology?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Resolve IPv4 addresses to MAC addresses.
A. minimizing of collisions b. division into broadcast domains
A. larger address space b. data types and classes of service c. authentication and encryption
18. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Transport
Host mobility
A. flow control b. session establishment c. numbering and sequencing
19. What do you need to use for an initial configuration on a Cisco router?
Binary ANDing
A. hot keys b. context-sensitive c. command syntax check
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Console interface
20. How many bits make up an IPv4 address?
Time-to-live (TTL)
A. router b. firewall
32 bits
A. DB 60 b. Winchester 15-pin c. smart serial
21. 3 terms that define the forms of help available within the Cisco IOS
255.255.255.0
A. hot keys b. context-sensitive c. command syntax check
Switch
Static
22. What event occurs during the 3-way handshake?
Network Layer
Is used by the server to resolve names.
TCP initializes the sequence numbers for the sessions.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
23. What is the function of the DLL?
172.16.192.160
It provides for the exchange of data over a common local media.
Hub
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
24. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
A. copper UTP b. optical fiber
0 to 1023
The physical address is added.
172.16.192.160
25. What determines the method of media access control?
A. media sharing b. logical topology
The magnetic field around the adjacent pairs of wire.
255.255.255.0
8
26. What does the IEEE 802.2 standard represent in Ethernet technologies?
Next-Hop Address
It reduces unnecessary broadcasts.
Logical Link Control sublayer
A. show startup-config b. show running-config
27. 3 statements about the role of routers in the network
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. it has centralized administration b. security is easier to enforce
Originate data flow.
A. media sharing b. logical topology
28. After an ethernet collision - which device has priority to transmit data?
Network Media Control
Console
Any device whose backoff timer expires first.
A. media sharing b. logical topology
29. What characteristic of an UTP helps reduce interference?
A. copper UTP b. optical fiber
Network Layer Packet
Twisting of the cables
Console
30. Which IP packet field will prevent endless loops?
Time-to-live (TTL)
As the commands are entered.
Any device whose backoff timer expires first.
Host A
31. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
A. MTA b. SMTP
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Network address
The physical address is added.
32. 2 features that make switches preferable to hubs
The physical address is added.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. minimizing of collisions b. division into broadcast domains
33. 3 facts about the network portion of an IPv4 address
It uses support from the lower layers to distinguish between connections to the service.
Console interface
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
They must wait until the first hosts finish transfering the media.
34. An admin needs to keep contents private - which access method should he use?
SSH
Physical
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. MTA b. SMTP
35. What are 3 properties of contention-based media access for a shared media?
32 bits
It uses support from the lower layers to distinguish between connections to the service.
A. router b. firewall
A. non-deterministic b. less overhead c. collisions exist
36. What is the purpose of a default gateway?
Identify the device that allows local network computers to communicate w/ devices in other networks.
Hub
The magnetic field around the adjacent pairs of wire.
A. hot keys b. context-sensitive c. command syntax check
37. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
IP is not properly installed
To prevent the receiver from being overwhelmed by incoming data.
Ctrl + Shift + 6
They must wait until the first hosts finish transfering the media.
38. What are 2 protocols for transfering web resources?
A. HTTP b. HTTPS
A. perform degradation b. security issues c. host identification
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
39. At which layers of the OSI model does ethernet operate?
Source Port
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. physical layer b. DLL layer
40. 3 features that allow TCP to realibly and accurately track the transmission of data
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. they initiate data exchanges b. they may upload data to servers
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. flow control b. session establishment c. numbering and sequencing
41. Which combination of keys can be used to interrupt a ping or traceroute process?
IP is not properly installed
Ctrl + Shift + 6
A. DNS b. SMTP c. POP
Network portion
42. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
255.255.255.224
The physical address is added.
A. media sharing b. logical topology
Network Layer Packet
43. What can you identify when you examine the Network Layer header?
The destination host address.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Destination is not contacted before a packet is sent.
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
44. What is the purpose of the preamble in an ethernet frame?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
SMB
A. identifies the communicating applications b. identifies multiple conversations between the hosts
It uses lasers as the light source.
45. Intermediary devices used to implement security between networks
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. they initiate data exchanges b. they may upload data to servers
A. router b. firewall
Fiber
46. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
A. show startup-config b. show running-config
When connecting a host to a switch.
255.255.255.224
Source and Destination IP address
47. What info is found in the TCP and UDP header info?
Collisions can decrease network performance.
Source and Destination Ports
SSH
A. Cat5 UTP b. Cat6 UTP
48. 2 characteristics of peer-2-peer
Network portion
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. decentralized resources b. resource sharing w/o a dedicated server
49. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
A. media sharing b. logical topology
Logical Link Control sublayer
Binary ANDing
A. netstat -r b. route PRINT
50. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
Fiber
SMB
To prevent the receiver from being overwhelmed by incoming data.
A. identifies the communicating applications b. identifies multiple conversations between the hosts