Test your basic knowledge |

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. At which OSI layer is a logical path created between two host systems named CK1 and CK2 on the Certkiller LAN?






2. As a CCNA candidate - you must know the various layers of the OSI model. At which layers of the OSI model do Wide Area Networks operate in?






3. Which of the protocols below - operates at Layer 2 of the OSI model - and is used to maintain a loop-free network?






4. when files are transferred between a host and an FTP server - the data is divided into smaller pieces of transmission. As these pieces arrive at the destination host they must be reassembled to reconstruct the original file. What provides for the rea






5. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the Certkiller Switched LAN?






6. Which three of the protocols below belong to the application layer? (Select three answer choices)






7. Some of the older Certkiller switches store the entire frame before forwarding it to the destination. What are two effects on network performance of configuring a switch to do this?






8. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?






9. Two buildings on the London campus of a CK corporation must be connected to use Ethernet with a bandwidth of at least 100 Mbps. CK is concerned about possible problems from voltage potential differences between the two buldings. Which media type shou






10. You want to influence the root bridge selection within the Certkiller LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)






11. By default - which of the following factors determines the spanning-tree path cost?






12. As the Certkiller network administrator - you are required to have a firmunderstanding of the OSI model. Why does the data communication industry use the layered OSI reference model?






13. What are two characteristics of 'store and forward' switching?






14. Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?






15. Which of the following correctly describe steps in the OSI date encapsulation process?






16. Which of the protocols below use TCP at the transport layer?






17. You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operations?






18. Which line from the output of the show ip interface command indicates that there is a Layer 1 problem?






19. Which of the following services use TCP?






20. You are the administrator of the Certkiller LAN and you have been reviewing error logs of networking devices and notice a large number of errors associated with several MAC addresses. You suspect that some of the errors are being generated by the rou






21. You need to perform some initial configuration tasks on a new Certkiller switch. What are the possible trunking modes for this switch port?






22. Certkiller is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions - the company needs to make sure that the phone traffic is on a different network






23. When a switch port is used as a VLAN trunk - which of the following trunk modes are valid?






24. A host computer has been correctly configured with a static IP address - but the default gateway is incorrectly set. Which layer of the OSI model will be first effected by this configuration error?






25. Which of the following commands would be applied to a WAN interface - but not on LAN Interface?






26. You want to upgrade the Certkiller LAN so that all ports operate in full duplex mode. Which statement is true about full-duplex Ethernet when comparing to half-duplex Ethernet?






27. As a CCNA candidate - you will be expected to know the OSI model very well. Which of the following are associated with the application layer (layer 7) of the OSI model?






28. With regard to Ethernet media access methods - which of the following are true?






29. You unsuccessfully try to ping the Internet from the PC host on the LAN. During the troubleshooting process - you enter the 'show ip nat translations' command but the output is blank. What is the most likely cause of the problem?






30. At which layer of the OSI model does the protocol that provides the information displayed by the 'show cdp neighbors' command operate?






31. Which Layer 4 protocol is used for a Telnet connections between two CK routers?






32. Which two statements describe the operation of the CSMA/CD access method - which is in use on the Certkiller network?






33. You have set up an Internet based FTP server - where people can upload and download files. In terms of the OSI model - What is the highest layer used during the FTP sessions.






34. The Certkiller corporate LAN consists of one large flat network. You decide to segment this LAN into two separate networks with a router. What will be the affect of this change?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


35. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?






36. Which of the following are types of flow control?






37. Which of the following are true of Ethernet technology?






38. You need to perform some initial configuration tasks on a new Certkiller switch. What is the purpose of assigning an IP address to a switch?






39. While troubleshooting an issue in the Certkiller LAN you notice that a network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement - What is known about the network interface port?






40. Assuming you build networks to exact specifications - What is the recommended maximum length a 10BaseT cable can be before it has to be segmented or repeated?






41. What is the purpose of the spanning-tree algorithm in a switched LAN?






42. You are experiencing intermittent issues relating to congestion within the Certkiller network. What are the possible causes of congestion on this LAN?






43. Although TCP segments are similar to UDP segments - TCP packets contains some additional fields. Which of the following are found in a TCP header - but not in a UDP header?






44. What kind of cable should be used to establish a trunked line between two Catalyst switches?






45. On a half-duplex Ethernet LAN - two hosts attempt to send data simultaneously - resulting in a collision. Following this collision - what will the hosts do?






46. Which protocol uses TCP port 443 at layer 4?






47. Which of the following are spanning tree port states?






48. You are logged into a router and wish to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?






49. A Certkiller Ethernet switch receives a unicast frame with a destination MAC that IS listed in the switch table. What will this switch do with the frame?






50. While troubleshooting a network connectivity problem - a Certkiller technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However - when the ping command is issued from the works