Test your basic knowledge |

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which three of the protocols below belong to the application layer? (Select three answer choices)






2. The Certkiller network administrator needs to a switch named CK1 to become the root bridge for a redundant path switched network. What can be done to ensure that CK1 will always assume the role as the root bridge?






3. The Certkiller LAN is upgrading all devices to operate in full duplex. Which statement is true about full-duplex Ethernet in comparison to half-duplex Ethernet?






4. Which layer of the OSI reference model is responsible for ensuring reliable end to end delivery of data?






5. What kind of cable should be used to establish a trunked line between two Catalyst switches?






6. A Certkiller switch is configured with all ports assigned to VLAN 2. In addition - all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?






7. By default - which of the following factors determines the spanning-tree path cost?






8. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the Certkiller Switched LAN?






9. You need to perform some initial configuration tasks on a new Certkiller switch. What is the purpose of assigning an IP address to a switch?






10. A Certkiller Ethernet switch receives a unicast frame with a destination MAC that IS listed in the switch table. What will this switch do with the frame?






11. Which of the following can lead to the contribution of LAN traffic congestion?






12. You want to influence the root bridge selection within the Certkiller LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)






13. Both the switches and hubs are being utilized within the CK network. Which of the following is true regarding the use of switches and hubs for the network connectivity in this network?






14. Which two statements describe the operation of the CSMA/CD access method - which is in use on the Certkiller network?






15. Certkiller has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?






16. Which of the following are spanning tree port states?






17. Two buildings on the London campus of a CK corporation must be connected to use Ethernet with a bandwidth of at least 100 Mbps. CK is concerned about possible problems from voltage potential differences between the two buldings. Which media type shou






18. Which Layer 4 protocol is used for a Telnet connections between two CK routers?






19. As a CCNA candidate - you will be expected to know the OSI model very well. Which of the following are associated with the application layer (layer 7) of the OSI model?






20. Which of the following are true of Ethernet technology?






21. What are two characteristics of 'store and forward' switching?






22. The LAN needs are expanding at the CK corporate office - which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the CK network. Which of the following are layer 1 devices that you can use?






23. The CK network administrator needs to determine what LAN devices to install on the CK network. What are two advantages of using Layer 2 Ethernet switches over hubs?






24. Which of the protocols below use TCP at the transport layer?






25. Which protocol uses TCP port 443 at layer 4?






26. When comparing and contrasting the similarities and differences between bridges and switches - which of the following are valid statements?






27. With regard to Ethernet media access methods - which of the following are true?






28. Which one of the following characterisitcs is true regardigin the use of the hubs and switches?






29. Which of the following are types of flow control?






30. Both bridges are switches are being used throughout the CK LAN. Which of the following statements are true regarding bridges and switches in this network?






31. An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location?






32. when files are transferred between a host and an FTP server - the data is divided into smaller pieces of transmission. As these pieces arrive at the destination host they must be reassembled to reconstruct the original file. What provides for the rea






33. Split horizon has been enabled within the Certkiller routed network. Which one of the following statements best explains the split horizon rule?






34. In a switched LAN network - What is the Spanning-Tree algorithm used for?






35. You unsuccessfully try to ping the Internet from the PC host on the LAN. During the troubleshooting process - you enter the 'show ip nat translations' command but the output is blank. What is the most likely cause of the problem?






36. Which of the following correctly describe the various functions and virtues of a router?






37. Which of the following devices can the Certkiller network administrator use to segment the LAN?






38. On a half-duplex Ethernet LAN - two hosts attempt to send data simultaneously - resulting in a collision. Following this collision - what will the hosts do?






39. You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network?






40. Which of the following commands would be applied to a WAN interface - but not on LAN Interface?






41. Which of the protocols below - operates at Layer 2 of the OSI model - and is used to maintain a loop-free network?






42. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?






43. The Certkiller corporate LAN consists of one large flat network. You decide to segment this LAN into two separate networks with a router. What will be the affect of this change?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


44. Certkiller is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions - the company needs to make sure that the phone traffic is on a different network






45. Some of the older Certkiller switches store the entire frame before forwarding it to the destination. What are two effects on network performance of configuring a switch to do this?






46. A host computer has been correctly configured with a static IP address - but the default gateway is incorrectly set. Which layer of the OSI model will be first effected by this configuration error?






47. As a Certkiller trainee you are required to set the default gateway on a Cisco switch to the IP address of 192.168.1.115. Which IOS command should you use?






48. Why is full-duplex Ethernet superior to its single-duplex counterpart?






49. While troubleshooting an issue in the Certkiller LAN you notice that a network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement - What is known about the network interface port?






50. Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?