SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Group of hosts that have identical bit patterns in the high order bits of their addresses
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Source and Destination Ports
Network
When connecting a host to a switch.
2. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
Network address
It uses lasers as the light source.
A. flow control b. session establishment c. numbering and sequencing
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
3. What are 2 features of User Diagram Protocol (UDP)?
A. they initiate data exchanges b. they may upload data to servers
A. low overhead b. connectionless
Physical
Window Size
4. Why is flow control used for TCP data transfer?
A backbone cable.
Any device whose backoff timer expires first.
To prevent the receiver from being overwhelmed by incoming data.
To facilitate the entry and exit of data on media.
5. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
2046
Create signals that represent the bits in each frame for the media.
UDP
Signal loss can be experienced.
6. Intermediary devices used to implement security between networks
The address of the router that the host will use to 'get to the other side'.
A. router b. firewall
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Application Layer
7. What are 2 commands used to view a host routing table?
It reduces unnecessary broadcasts.
A. show startup-config b. show running-config
A. netstat -r b. route PRINT
A. larger address space b. data types and classes of service c. authentication and encryption
8. On a ethernet segment - why do hosts that experience a collision use a random delay before attempting to transmit?
Router
A random delay helps prevent the stations from experiencing another collision during transmission.
172.16.192.160
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
9. What can you identify when you examine the Network Layer header?
Source Port
Transport
The destination host address.
A. show startup-config b. show running-config
10. What is the primary purpose of Layer 4?
Identify processes or services that are communicating with end devices.
The destination host address.
UDP
The packets will be delivered and reassembled at destination.
11. 2 most commonly used media types in ethernet networks
A. copper UTP b. optical fiber
The magnetic field around the adjacent pairs of wire.
Rollover cable
Network Layer
12. What event occurs during the 3-way handshake?
TCP initializes the sequence numbers for the sessions.
A. netstat -r b. route PRINT
It provides for the exchange of data over a common local media.
IP is not properly installed
13. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
8
DNS
The address of the router that the host will use to 'get to the other side'.
14. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
A. servers b. routers c. network printers
Supports error detection.
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Console
16. What is the proper order of the OSI Layers?
Hub
A. physical layer b. DLL layer
Window Size
A. application b. presentation c. session d. transmision e. network f. data link g. physical
17. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
A backbone cable.
SMB
IP Protocol
A. Physical b. Data Link
18. What device can check for faults - integrity and performance of media?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
OTDR
As the commands are entered.
19. What is the role of MTA in handling email?
Create signals that represent the bits in each frame for the media.
A. it has centralized administration b. security is easier to enforce
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. Physical b. Data Link
20. What networking devices are recommended to be assigned static IP addresses?
Identify processes or services that are communicating with end devices.
A. servers b. routers c. network printers
A. addressing b. error detection c. frame delimiting
A. performance degradation b. security issues c. host identification
21. Statements that describe LAN
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. servers b. routers c. network printers
UDP
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
22. What is a characteristic of a single-mode fiber-optic cable?
A. application b. services
It uses lasers as the light source.
A. perform degradation b. security issues c. host identification
TCP initializes the sequence numbers for the sessions.
23. When is a straight-through cable used in a network?
When connecting a host to a switch.
To facilitate the entry and exit of data on media.
The MAC protocol can be very simple.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
24. What can be a problem that is reduced by adding end-to-end addressing?
Twisting of the cables
It reduces unnecessary broadcasts.
A. larger address space b. data types and classes of service c. authentication and encryption
Network Layer Packet
25. What application layer protocol is used to support file transfers between client and server?
FTP
Source and Destination Ports
Source Port
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
26. What is the function of the DLL?
It provides for the exchange of data over a common local media.
A. Cat5 UTP b. Cat6 UTP
Static
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
27. What correctly describes a MAC address?
Hosts return to listen-before-transmit mode.
Static
A. MTA b. SMTP
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
28. What are 3 common problems w/ large networks?
Show Interfaces
To prevent the receiver from being overwhelmed by incoming data.
A. perform degradation b. security issues c. host identification
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
29. What type of network cable is used between a terminal and a console port?
Rollover cable
It provides interface between applications on either end of the network.
They must wait until the first hosts finish transfering the media.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
30. What information is added during encapsulation at OSI Layer 3?
A. they initiate data exchanges b. they may upload data to servers
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A random delay helps prevent the stations from experiencing another collision during transmission.
Source and Destination IP address
31. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
It does not support encryption.
Destination Network Address
A. servers b. routers c. network printers
A. DB 60 b. Winchester 15-pin c. smart serial
32. 3 statements about routes and their use
A. physical layer b. DLL layer
A. DNS b. SMTP c. POP
0 to 1023
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
33. How many bits make up an IPv4 address?
32 bits
Hosts return to listen-before-transmit mode.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
As the commands are entered.
34. What do end devices do?
It uses lasers as the light source.
Logical Link Control sublayer
Source and Destination IP address
Originate data flow.
35. Where is the IOS file stored at?
The magnetic field around the adjacent pairs of wire.
A. larger address space b. data types and classes of service c. authentication and encryption
A default gateway (router).
Flash
36. 3 common problems w/ a large network
A. performance degradation b. security issues c. host identification
A. servers b. routers c. network printers
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Identify processes or services that are communicating with end devices.
37. What statements describe the logical token-passing topology?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. DNS b. SMTP c. POP
IP Protocol
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
38. What is a characteristic of a logical point-to-point topology?
A backbone cable.
A. DB 60 b. Winchester 15-pin c. smart serial
8
The MAC protocol can be very simple.
39. What is the role of the OSI Application Layer?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
It provides interface between applications on either end of the network.
To facilitate the entry and exit of data on media.
40. What is the purpose of resource records in DNS?
Is used by the server to resolve names.
Network portion
32 bits
Flash
41. What is a benefit of a WAN?
A. non-deterministic b. less overhead c. collisions exist
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Host mobility
A. application b. presentation c. session d. transmision e. network f. data link g. physical
42. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Source and Destination Ports
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Twisting of the cables
SSH
43. Which 2 options represent Layer 4 addressing?
A. copper UTP b. optical fiber
Collisions can decrease network performance.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. identifies the communicating applications b. identifies multiple conversations between the hosts
44. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
To prevent the receiver from being overwhelmed by incoming data.
Router
Hub
A. addressing b. error detection c. frame delimiting
45. What do the intermediary devices in the network do?
Is a layer of specific encapsulation.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Signal loss can be experienced.
It uses support from the lower layers to distinguish between connections to the service.
46. statements of IP adressing
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Host mobility
A physical topology.
A. decentralized resources b. resource sharing w/o a dedicated server
47. What is PDU?
Is a layer of specific encapsulation.
The destination host address.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. replace a switch w/ a router b. subnet the new networks
48. How does the application layer on a server process multiple client requests for services?
It uses support from the lower layers to distinguish between connections to the service.
IP Protocol
Destination is not contacted before a packet is sent.
A. Cat5 UTP b. Cat6 UTP
49. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
172.16.192.160
A. addressing b. error detection c. frame delimiting
MAC
The magnetic field around the adjacent pairs of wire.
50. 2 characteristics of clients in data networks
Source and Destination IP address
A. netstat -r b. route PRINT
A. they initiate data exchanges b. they may upload data to servers
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs