Test your basic knowledge |

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You want to influence the root bridge selection within the Certkiller LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)






2. You are logged into a router and wish to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?






3. Although TCP segments are similar to UDP segments - TCP packets contains some additional fields. Which of the following are found in a TCP header - but not in a UDP header?






4. Which of following VLAN frame encapsulation types are configurable on a Cisco switch?






5. You need to configure two Certkiller switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?






6. Which line from the output of the show ip interface command indicates that there is a Layer 1 problem?






7. Which three statements are true about the operation of a full-duplex Ethernet network - which is being used in the Certkiller LAN?






8. when files are transferred between a host and an FTP server - the data is divided into smaller pieces of transmission. As these pieces arrive at the destination host they must be reassembled to reconstruct the original file. What provides for the rea






9. You want to upgrade the Certkiller LAN so that all ports operate in full duplex mode. Which statement is true about full-duplex Ethernet when comparing to half-duplex Ethernet?






10. When you compare the differences between half-duplex and full-duplex Ethernet - which of the following characteristics are exclusive to half-duplex?






11. On a half-duplex Ethernet LAN - two hosts attempt to send data simultaneously - resulting in a collision. Following this collision - what will the hosts do?






12. Which of the following correctly describe steps in the OSI date encapsulation process?






13. Two buildings on the London campus of a CK corporation must be connected to use Ethernet with a bandwidth of at least 100 Mbps. CK is concerned about possible problems from voltage potential differences between the two buldings. Which media type shou






14. When a switch port is used as a VLAN trunk - which of the following trunk modes are valid?






15. The Certkiller network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?






16. In a switched LAN network - What is the Spanning-Tree algorithm used for?






17. You have set up an Internet based FTP server - where people can upload and download files. In terms of the OSI model - What is the highest layer used during the FTP sessions.






18. Which layer of the OSI reference model is responsible for ensuring reliable end to end delivery of data?






19. ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets?






20. A Certkiller technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the sh






21. The Certkiller network administrator needs to a switch named CK1 to become the root bridge for a redundant path switched network. What can be done to ensure that CK1 will always assume the role as the root bridge?






22. You unsuccessfully try to ping the Internet from the PC host on the LAN. During the troubleshooting process - you enter the 'show ip nat translations' command but the output is blank. What is the most likely cause of the problem?






23. What is the IEEE standard associated with Gigabit Ethernet?






24. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?






25. A Certkiller switch is configured with all ports assigned to VLAN 2. In addition - all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?






26. Both the switches and hubs are being utilized within the CK network. Which of the following is true regarding the use of switches and hubs for the network connectivity in this network?






27. With regard to Ethernet media access methods - which of the following are true?






28. Certkiller has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?






29. When comparing and contrasting the similarities and differences between bridges and switches - which of the following are valid statements?






30. The CK network administrator needs to determine what LAN devices to install on the CK network. What are two advantages of using Layer 2 Ethernet switches over hubs?






31. Which three of the protocols below belong to the application layer? (Select three answer choices)






32. CK1 is a switch in the Certkiller network. Why will CK1 never learn the broadcast address?






33. CDP is running between two CK devices. What information is supplied by CDP?






34. Why is full-duplex Ethernet superior to its single-duplex counterpart?






35. While troubleshooting a connectivity problem on the network - you issure the ping command from your PC command prompt - but the output shows 'request times out' At which OSI layer is this problem associated with?






36. Which of the following services use TCP?






37. You need to perform some initial configuration tasks on a new Certkiller switch. What are the possible trunking modes for this switch port?






38. You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network?






39. A new switch is installed in the Certkiller network. This switch is to be configured so that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network. Which of the conditions below have to be met in o






40. What is the purpose of the spanning-tree algorithm in a switched LAN?






41. A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role of the Root Bridge?






42. Which OSI layer is associated with the following: The acknowledgment of transmissions - sequencing - and flow control across a network?






43. Two stations on the Certkiller LAN transmit at the same time - resulting in a collision. What happens when a collision occurs on the network?






44. By default - which of the following factors determines the spanning-tree path cost?






45. At which layer of the OSI model does the protocol that provides the information displayed by the 'show cdp neighbors' command operate?






46. Which protocol uses TCP port 443 at layer 4?






47. The LAN needs are expanding at the CK corporate office - which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the CK network. Which of the following are layer 1 devices that you can use?






48. Which Layer 4 protocol is used for a Telnet connections between two CK routers?






49. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?






50. Which of the following are types of flow control?