SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a benefit of a WAN?
No collisions will occur on this link.
Host mobility
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
2. What is the role of the OSI Application Layer?
It provides interface between applications on either end of the network.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Physical
TCP initializes the sequence numbers for the sessions.
3. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
A. low overhead b. connectionless
MAC
Destination Network Address
IP is not properly installed
4. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
UDP
32 bits
A random delay helps prevent the stations from experiencing another collision during transmission.
8
5. At which layers of the OSI model does ethernet operate?
A. performance degradation b. security issues c. host identification
Router(config)# hostname Costas
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. physical layer b. DLL layer
6. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
A. the router will discard the packet b. the router will send a time exceeded message to the source host
As the commands are entered.
IP is not properly installed
Hosts return to listen-before-transmit mode.
7. Network Protocols
Network Layer Packet
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
IP is not properly installed
8. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
Router(config)# interface FastEthernet 0/1
A. physical layer b. DLL layer
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. low overhead b. connectionless
9. What is a component of a routing table entry?
No collisions will occur on this link.
Router
Next-Hop Address
A. Cat5 UTP b. Cat6 UTP
10. What does the IEEE 802.2 standard represent in Ethernet technologies?
SSH
Logical Link Control sublayer
Source and Destination Ports
TCP initializes the sequence numbers for the sessions.
11. What command can be used to determine if the router has experienced any input or output errors?
Physical
Wireless
A. enable mode b. priviledge executive mode
Show Interfaces
12. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
8
Router(config)# hostname Costas
As the commands are entered.
A. show startup-config b. show running-config
13. After an ethernet collision - which device has priority to transmit data?
RJ-45
Any device whose backoff timer expires first.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
14. What 2 type of cables would most commonly be used for new runs?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Next-Hop Address
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. Cat5 UTP b. Cat6 UTP
15. What are 2 protocols for transfering web resources?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. goodput b. throughput c. bandwidth
255.255.255.0
A. HTTP b. HTTPS
16. During encapsulation - what happens in the Data Link Layer?
Minimal delays in data delivery.
The magnetic field around the adjacent pairs of wire.
The physical address is added.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
17. 2 features that make switches preferable to hubs
Console interface
A. hot keys b. context-sensitive c. command syntax check
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. minimizing of collisions b. division into broadcast domains
18. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
Binary ANDing
Destination is not contacted before a packet is sent.
2046
It does not support encryption.
19. When a network service fails - which port is most often used to access a router for management purposes?
Destination is not contacted before a packet is sent.
Console
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
The destination host address.
20. What are 2 common characteristics associated w/ dynamic routing protocols?
Binary ANDing
Router
No collisions will occur on this link.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
21. 3 features that allow TCP to realibly and accurately track the transmission of data
A backbone cable.
A. flow control b. session establishment c. numbering and sequencing
Wireless
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
22. 3 statements of media acess control
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Ctrl + Shift + 6
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
23. What device can check for faults - integrity and performance of media?
A. copper UTP b. optical fiber
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
OTDR
A. it has centralized administration b. security is easier to enforce
24. What can be a problem that is reduced by adding end-to-end addressing?
Network address
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
It reduces unnecessary broadcasts.
A. DB 60 b. Winchester 15-pin c. smart serial
25. During a TCP session - if packets arrive out of order - what will happen?
Console interface
It provides interface between applications on either end of the network.
The packets will be delivered and reassembled at destination.
A. Physical b. Data Link
26. What are the advantages of using a client-server model?
A. it has centralized administration b. security is easier to enforce
A. router b. firewall
A random delay helps prevent the stations from experiencing another collision during transmission.
Console
27. When destination network is not in the routing table - What are 2 actions the router might take?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
32 bits
Physical
Is used by the server to resolve names.
28. Which combination of keys can be used to interrupt a ping or traceroute process?
Logical Link Control sublayer
A. addressing b. error detection c. frame delimiting
Network portion
Ctrl + Shift + 6
29. 3 characteristics of valid Ethernet Layer 2 addresses
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Console
Network Media Control
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
30. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Destination Network Address
31. Which portion of the network layer address does a router use to forward packets?
They must wait until the first hosts finish transfering the media.
No collisions will occur on this link.
Network portion
Window Size
32. On a ethernet segment - why do hosts that experience a collision use a random delay before attempting to transmit?
Network
The destination host address.
172.16.192.160
A random delay helps prevent the stations from experiencing another collision during transmission.
33. What is a disadvantage of Telnet?
Hub
Twisting of the cables
It does not support encryption.
Network address
34. What causes crosstalk within cable pairs when using UTP?
The magnetic field around the adjacent pairs of wire.
The destination host address.
Physical
0 to 1023
35. What are 2 email components used to forward mail between servers?
A. purpose b. geographic location c. ownership
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. MTA b. SMTP
MAC
36. What is a drawback of the CSMA/CD access method?
UDP
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Destination is not contacted before a packet is sent.
Collisions can decrease network performance.
37. What is an automated service that matches resource names w/ required IP addresses?
DNS
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. larger address space b. data types and classes of service c. authentication and encryption
A. Physical b. Data Link
38. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
Network
IP is not properly installed
It does not support encryption.
Network Media Control
39. 3 common problems w/ a large network
A physical topology.
A. purpose b. geographic location c. ownership
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. performance degradation b. security issues c. host identification
40. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
Binary ANDing
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. application b. services
UTP
41. 3 functions of the upper data link sublayer in the OSI model
DNS
A. decentralized resources b. resource sharing w/o a dedicated server
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
42. What command is used to change the default name to 'Costas'?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Router(config)# hostname Costas
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. application b. services
43. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
255.255.255.0
A. perform degradation b. security issues c. host identification
A. show startup-config b. show running-config
The physical address is added.
44. Where is the IOS file stored at?
Flash
IP Protocol
Physical
32 bits
45. What are 2 commands used to view a host routing table?
A. addressing b. error detection c. frame delimiting
A. HTTP b. HTTPS
A. netstat -r b. route PRINT
Rollover cable
46. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
UTP
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
The magnetic field around the adjacent pairs of wire.
Resolve IPv4 addresses to MAC addresses.
47. In a connectionless system - What is correct?
Destination is not contacted before a packet is sent.
A. addressing b. error detection c. frame delimiting
32 bits
The magnetic field around the adjacent pairs of wire.
48. What is the role of MTA in handling email?
The packets will be delivered and reassembled at destination.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Originate data flow.
It provides for the exchange of data over a common local media.
49. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
When connecting a host to a switch.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
UDP
172.16.192.160
50. statements of IP adressing
The physical address is added.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. Physical b. Data Link
Twisting of the cables