SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Hard
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. At which layer of the OSI model does the protocol that provides the information displayed by the 'show cdp neighbors' command operate?
Layer 4
Show cdp neighbor detail
Data link
They can provide hosts with information about network problems. and They are encapsulated within IP datagrams.
2. Which of the following are types of flow control?
A broadcast address will never be the source address of a frame
Buffering - Cut-through - and Congestion avoidance
Auto - On - and Desirable
Data link
3. You need to configure two Certkiller switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?
VTP
Layer 3
Data link
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
4. Which three of the protocols below belong to the application layer? (Select three answer choices)
The network layer
HTTPS - SMTP - and TFTP
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
Show cdp neighbor detail
5. The CK network administrator needs to determine what LAN devices to install on the CK network. What are two advantages of using Layer 2 Ethernet switches over hubs?
Port security
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
Information about a route should never be sent back in the direction from which the original update came.
6. In a switched LAN network - What is the Spanning-Tree algorithm used for?
Serial0/1 is down - line protocol is down
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
Application
It is used to prevent switching loops in networks with redundant switched routes.
7. Which OSI layer header contains the address of a destination host that is on another network?
Network
Packet switching - Packet filtering and Internetwork communication.
Transport
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
8. Which of the following correctly describe steps in the OSI date encapsulation process?
The switch will forward the frame to a specific port
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
ARP and ICMP
9. You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operations?
Application
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
802.1Q and ISL
10. Which of the following correctly describe the various functions and virtues of a router?
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
Data link
Packet switching - Packet filtering and Internetwork communication.
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
11. Which OSI layer is associated with the following: The acknowledgment of transmissions - sequencing - and flow control across a network?
Network
Layer 4
Too many hosts in a broadcast domain - Broadcast storms and Low bandwidth
It will prevent segment 1's broadcasts from getting to segment 2.
12. As the Certkiller network administrator - you are required to have a firmunderstanding of the OSI model. Why does the data communication industry use the layered OSI reference model?
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
It will prevent segment 1's broadcasts from getting to segment 2.
VTP will allow switches to share VLAN configuration information
13. With regard to Ethernet media access methods - which of the following are true?
To allow remote management of the switch.
Network
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
SMTP FTP and HTTP
14. A Certkiller Ethernet switch receives a unicast frame with a destination MAC that IS listed in the switch table. What will this switch do with the frame?
Layer 4
VTP
Encapsulations PPP and authentication CHAP
The switch will forward the frame to a specific port
15. Assuming you build networks to exact specifications - What is the recommended maximum length a 10BaseT cable can be before it has to be segmented or repeated?
HTTPS - SMTP - and TFTP
The network layer
100 meters
Duplex mismatch
16. When you compare the differences between half-duplex and full-duplex Ethernet - which of the following characteristics are exclusive to half-duplex?
CertK Switch(config)# ip default-gateway 192.168.1.115
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
Sequence number - Window size - and Acknowledgment number
17. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
It will prevent segment 1's broadcasts from getting to segment 2.
MAC Address and Bridge Priority
Learning - Listening - and Forwarding
Port security
18. You want to upgrade the Certkiller LAN so that all ports operate in full duplex mode. Which statement is true about full-duplex Ethernet when comparing to half-duplex Ethernet?
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
Congestion avoidance - Windowing and Buffering
Packet switching - Packet filtering and Internetwork communication.
Decrease the window size.
19. when files are transferred between a host and an FTP server - the data is divided into smaller pieces of transmission. As these pieces arrive at the destination host they must be reassembled to reconstruct the original file. What provides for the rea
Learning - Listening - and Forwarding
The sequence number in the TCP header.
Layer 4
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
20. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the Certkiller Switched LAN?
Information about a route should never be sent back in the direction from which the original update came.
In an improperly implemented redundant topology
Port security
An additional broadcast domain will be created.
21. You need to perform some initial configuration tasks on a new Certkiller switch. What are the possible trunking modes for this switch port?
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
HTTPS
Auto - On - and Desirable
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
22. You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network?
Data link
To prevent switching loops in networks with redundant switched paths.
Switches - Bridges - and Routers
Congestion avoidance - Windowing and Buffering
23. Which of the protocols below - operates at Layer 2 of the OSI model - and is used to maintain a loop-free network?
STP
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
They can provide hosts with information about network problems. and They are encapsulated within IP datagrams.
24. Which of the following are spanning tree port states?
Certkiller B > trace
Decrease the window size.
Learning - Listening - and Forwarding
Transport
25. You need to perform some initial configuration tasks on a new Certkiller switch. What is the purpose of assigning an IP address to a switch?
Packet switching - Packet filtering and Internetwork communication.
It operates without collisions and It provides faster data transfer
Certkiller B > trace
To allow remote management of the switch.
26. Certkiller users have noticed extremely slow network performance - intermittent connectivity - and connection losses. After entering the 'show interfaces' command - you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that
A broadcast address will never be the source address of a frame
Show arp and Show interface
Auto - Desirable - and On
Duplex mismatch
27. Which two of the following values does STP take into consideration when it elects the root bridge?
The Bridgeg ID and The bridge priority
Transport
ARP and ICMP
802.1Q and ISL
28. Both bridges are switches are being used throughout the CK LAN. Which of the following statements are true regarding bridges and switches in this network?
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
Layer 4
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
Application
29. Which of the following commands would be applied to a WAN interface - but not on LAN Interface?
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
Path selections and Packet switching.
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
Encapsulations PPP and authentication CHAP
30. An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location?
Congestion avoidance - Windowing and Buffering
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
All switch and bridge ports are in either the forwarding or blocking state.
31. Which of the following can lead to the contribution of LAN traffic congestion?
Too many hosts in a broadcast domain - Broadcast storms and Low bandwidth
Increased latency and Filtering of all frame errors
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
Network
32. Which of the following services use TCP?
SMTP FTP and HTTP
Device Identifiers - Capabilities list - Platform
A broadcast domain with too many hosts - Broadcast storms - and Low bandwidth
It is used to prevent switching loops in networks with redundant switched routes.
33. Which layer of the OSI reference model is responsible for ensuring reliable end to end delivery of data?
Transport
A cross-over cable
Show cdp neighbor detail
Serial0/1 is down - line protocol is down
34. The Certkiller network administrator wants to use a router named CK1 to segment the local network. What are some of the advantages of using CK1 to segment the network? (Choose two)
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth
The network layer
Information about a route should never be sent back in the direction from which the original update came.
35. Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?
Serial0/1 is down - line protocol is down
Information about a route should never be sent back in the direction from which the original update came.
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
36. Which one of the following characterisitcs is true regardigin the use of the hubs and switches?
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
VTP
Switches increase the number of collision domains in the network.
Learning - Listening - and Forwarding
37. What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?
All switch and bridge ports are in either the forwarding or blocking state.
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
It is the sum of the costs based on bandwidth
Switches - Bridges - and Routers
38. The LAN needs are expanding at the CK corporate office - which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the CK network. Which of the following are layer 1 devices that you can use?
A hub and A repeater.
A broadcast address will never be the source address of a frame
Fiber optic cable.
Network
39. Which two statements describe the operation of the CSMA/CD access method - which is in use on the Certkiller network?
The system is malfunctioning.
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
Too many hosts in a broadcast domain - Broadcast storms and Low bandwidth
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
40. The system LED is amber on a new Certkiller Catalyst 2950 series switch. What does this indicate?
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
The system is malfunctioning.
Sequence number - Window size - and Acknowledgment number
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
41. ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets?
TCP
Switches increase the number of collision domains in the network.
They can provide hosts with information about network problems. and They are encapsulated within IP datagrams.
It is used to prevent switching loops in networks with redundant switched routes.
42. Split horizon has been enabled within the Certkiller routed network. Which one of the following statements best explains the split horizon rule?
It will prevent segment 1's broadcasts from getting to segment 2.
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
Information about a route should never be sent back in the direction from which the original update came.
Auto - Desirable - and On
43. The corporate head office of Certkiller has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence - wh
802.1Q and ISL
802.3ab and 802.3z
SMTP - FTP - HTTP - and HTTPS
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
44. Which Layer 4 protocol is used for a Telnet connections between two CK routers?
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
802.1Q and ISL
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
TCP
45. Certkiller is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions - the company needs to make sure that the phone traffic is on a different network
A hub and A repeater.
VLAN and Swtich
The sequence number in the TCP header.
Data link
46. Cisco is the leader in the router market space. What basic functions do their routers perform in a network?
Configure the switch so that it has lower priority than other switches in the network
Path selections and Packet switching.
Layer 4
Packet switching - Packet filtering and Internetwork communication.
47. A Certkiller technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the sh
Layer 4
SMTP FTP and HTTP
Data link
Show cdp neighbor detail
48. The Certkiller network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?
802.3ab and 802.3z
100 meters
Increased latency and Filtering of all frame errors
ARP and ICMP
49. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
Buffering - Cut-through - and Congestion avoidance
Decrease the window size.
STP
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
50. Which three statements are true about the operation of a full-duplex Ethernet network - which is being used in the Certkiller LAN?
SMTP FTP and HTTP
A cross-over cable
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
It operates without collisions and It provides faster data transfer