SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CCNA Hard
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You want to influence the root bridge selection within the Certkiller LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)
It is the sum of the costs based on bandwidth
It is used to prevent switching loops in networks with redundant switched routes.
Show cdp neighbor detail
MAC Address and Bridge Priority
2. You are logged into a router and wish to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?
Show cdp neighbor detail
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
HTTPS - SMTP - and TFTP
The port is experiencing errors
3. Although TCP segments are similar to UDP segments - TCP packets contains some additional fields. Which of the following are found in a TCP header - but not in a UDP header?
Serial0/1 is down - line protocol is down
Sequence number - Window size - and Acknowledgment number
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
Learning - Listening - and Forwarding
4. Which of following VLAN frame encapsulation types are configurable on a Cisco switch?
SMTP - FTP - HTTP - and HTTPS
A hub and A repeater.
Data link
802.1Q and ISL
5. You need to configure two Certkiller switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
VTP
It operates without collisions and It provides faster data transfer
Layer 4
6. Which line from the output of the show ip interface command indicates that there is a Layer 1 problem?
The port is experiencing errors
Layer 3
Serial0/1 is down - line protocol is down
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
7. Which three statements are true about the operation of a full-duplex Ethernet network - which is being used in the Certkiller LAN?
CertK Switch(config)# ip default-gateway 192.168.1.115
Congestion avoidance - Windowing and Buffering
The sequence number in the TCP header.
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
8. when files are transferred between a host and an FTP server - the data is divided into smaller pieces of transmission. As these pieces arrive at the destination host they must be reassembled to reconstruct the original file. What provides for the rea
Learning - Listening - and Forwarding
SMTP - FTP - HTTP - and HTTPS
The sequence number in the TCP header.
Switches - Bridges - and Routers
9. You want to upgrade the Certkiller LAN so that all ports operate in full duplex mode. Which statement is true about full-duplex Ethernet when comparing to half-duplex Ethernet?
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
It operates without collisions and It provides faster data transfer
A cross-over cable
The sequence number in the TCP header.
10. When you compare the differences between half-duplex and full-duplex Ethernet - which of the following characteristics are exclusive to half-duplex?
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
100 meters
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
Device Identifiers - Capabilities list - Platform
11. On a half-duplex Ethernet LAN - two hosts attempt to send data simultaneously - resulting in a collision. Following this collision - what will the hosts do?
802.3ab and 802.3z
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
An electrical pulse indicates that the collision has cleared.
Decrease the window size.
12. Which of the following correctly describe steps in the OSI date encapsulation process?
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
Network
802.3ab and 802.3z
13. Two buildings on the London campus of a CK corporation must be connected to use Ethernet with a bandwidth of at least 100 Mbps. CK is concerned about possible problems from voltage potential differences between the two buldings. Which media type shou
CertK Switch(config)# ip default-gateway 192.168.1.115
Switches increase the number of collision domains in the network.
Fiber optic cable.
100 meters
14. When a switch port is used as a VLAN trunk - which of the following trunk modes are valid?
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
An additional broadcast domain will be created.
Serial0/1 is down - line protocol is down
Auto - Desirable - and On
15. The Certkiller network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?
Transport
Hosts use a logical bus topology
ARP and ICMP
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
16. In a switched LAN network - What is the Spanning-Tree algorithm used for?
To allow remote management of the switch.
It is used to prevent switching loops in networks with redundant switched routes.
Packet switching - Packet filtering and Internetwork communication.
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
17. You have set up an Internet based FTP server - where people can upload and download files. In terms of the OSI model - What is the highest layer used during the FTP sessions.
100 meters
MAC Address and Bridge Priority
Application
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
18. Which layer of the OSI reference model is responsible for ensuring reliable end to end delivery of data?
Network
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
Transport
Switches increase the number of collision domains in the network.
19. ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets?
In an improperly implemented redundant topology
It will prevent segment 1's broadcasts from getting to segment 2.
They can provide hosts with information about network problems. and They are encapsulated within IP datagrams.
Physical Layer and Datalink Layer
20. A Certkiller technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the sh
Duplex mismatch
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
Data link
An electrical pulse indicates that the collision has cleared.
21. The Certkiller network administrator needs to a switch named CK1 to become the root bridge for a redundant path switched network. What can be done to ensure that CK1 will always assume the role as the root bridge?
Configure the switch so that it has lower priority than other switches in the network
A broadcast address will never be the source address of a frame
Layer 4
Packet switching - Packet filtering and Internetwork communication.
22. You unsuccessfully try to ping the Internet from the PC host on the LAN. During the troubleshooting process - you enter the 'show ip nat translations' command but the output is blank. What is the most likely cause of the problem?
Network
Configure the switch so that it has lower priority than other switches in the network
A broadcast address will never be the source address of a frame
The interfaces must be configured for NAT.
23. What is the IEEE standard associated with Gigabit Ethernet?
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
802.3ab and 802.3z
VTP
The Bridgeg ID and The bridge priority
24. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
100 meters
25. A Certkiller switch is configured with all ports assigned to VLAN 2. In addition - all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?
Fiber optic cable.
An additional broadcast domain will be created.
Application
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
26. Both the switches and hubs are being utilized within the CK network. Which of the following is true regarding the use of switches and hubs for the network connectivity in this network?
Layer 4
To prevent switching loops in networks with redundant switched paths.
Switches increase the number of collision domains in the network.
Configure the switch so that it has lower priority than other switches in the network
27. With regard to Ethernet media access methods - which of the following are true?
Path selections and Packet switching.
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
Buffering - Cut-through - and Congestion avoidance
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
28. Certkiller has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?
The port is experiencing errors
Physical Layer and Datalink Layer
A broadcast domain with too many hosts - Broadcast storms - and Low bandwidth
VTP will allow switches to share VLAN configuration information
29. When comparing and contrasting the similarities and differences between bridges and switches - which of the following are valid statements?
The interfaces must be configured for NAT.
Serial0/1 is down - line protocol is down
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
VTP
30. The CK network administrator needs to determine what LAN devices to install on the CK network. What are two advantages of using Layer 2 Ethernet switches over hubs?
HTTPS - SMTP - and TFTP
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
Auto - On - and Desirable
Layer 3
31. Which three of the protocols below belong to the application layer? (Select three answer choices)
HTTPS - SMTP - and TFTP
Port security
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
A cross-over cable
32. CK1 is a switch in the Certkiller network. Why will CK1 never learn the broadcast address?
Configure the switch so that it has a lower priority than other switches in the network.
A broadcast address will never be the source address of a frame
100 meters
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
33. CDP is running between two CK devices. What information is supplied by CDP?
A cross-over cable
Sequence number - Window size - and Acknowledgment number
Telnet and FTP
Device Identifiers - Capabilities list - Platform
34. Why is full-duplex Ethernet superior to its single-duplex counterpart?
Sequence number - Window size - and Acknowledgment number
VTP will allow switches to share VLAN configuration information
Switches increase the number of collision domains in the network.
It operates without collisions and It provides faster data transfer
35. While troubleshooting a connectivity problem on the network - you issure the ping command from your PC command prompt - but the output shows 'request times out' At which OSI layer is this problem associated with?
VLAN and Swtich
ARP and ICMP
The network layer
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
36. Which of the following services use TCP?
A hub and A repeater.
SMTP FTP and HTTP
ARP and ICMP
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
37. You need to perform some initial configuration tasks on a new Certkiller switch. What are the possible trunking modes for this switch port?
Configure the switch so that it has lower priority than other switches in the network
Auto - On - and Desirable
It operates without collisions and It provides faster data transfer
Show cdp neighbor detail
38. You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network?
To prevent switching loops in networks with redundant switched paths.
Decrease the window size.
Congestion avoidance - Windowing and Buffering
It is used to prevent switching loops in networks with redundant switched routes.
39. A new switch is installed in the Certkiller network. This switch is to be configured so that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network. Which of the conditions below have to be met in o
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
VLAN and Swtich
It operates without collisions and It provides faster data transfer
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
40. What is the purpose of the spanning-tree algorithm in a switched LAN?
Encapsulations PPP and authentication CHAP
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
Data link
To prevent switching loops in networks with redundant switched paths.
41. A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role of the Root Bridge?
MAC Address and Bridge Priority
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
Configure the switch so that it has a lower priority than other switches in the network.
The switch will forward the frame to a specific port
42. Which OSI layer is associated with the following: The acknowledgment of transmissions - sequencing - and flow control across a network?
Layer 4
A broadcast domain with too many hosts - Broadcast storms - and Low bandwidth
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
SMTP FTP and HTTP
43. Two stations on the Certkiller LAN transmit at the same time - resulting in a collision. What happens when a collision occurs on the network?
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
Data link
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
Switches - Bridges - and Routers
44. By default - which of the following factors determines the spanning-tree path cost?
A cross-over cable
It is the sum of the costs based on bandwidth
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
45. At which layer of the OSI model does the protocol that provides the information displayed by the 'show cdp neighbors' command operate?
Show cdp neighbor detail
Data link
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
46. Which protocol uses TCP port 443 at layer 4?
Fiber optic cable.
Show arp and Show interface
The network layer
HTTPS
47. The LAN needs are expanding at the CK corporate office - which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the CK network. Which of the following are layer 1 devices that you can use?
A hub and A repeater.
Show arp and Show interface
Increased latency and Filtering of all frame errors
VLAN and Swtich
48. Which Layer 4 protocol is used for a Telnet connections between two CK routers?
TCP
It operates without collisions and It provides faster data transfer
Data link
Application
49. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
Port security
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
An additional broadcast domain will be created.
It will prevent segment 1's broadcasts from getting to segment 2.
50. Which of the following are types of flow control?
Buffering - Cut-through - and Congestion avoidance
VLAN and Swtich
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
A hub and A repeater.