SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Hard
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You need to perform some initial configuration tasks on a new Certkiller switch. What are the possible trunking modes for this switch port?
TCP
Auto - On - and Desirable
The switch will forward the frame to a specific port
802.3ab and 802.3z
2. Which two statements describe the operation of the CSMA/CD access method - which is in use on the Certkiller network?
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
Data link
SMTP - FTP - HTTP - and HTTPS
A hub and A repeater.
3. Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?
ARP and ICMP
In an improperly implemented redundant topology
Telnet and FTP
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
4. What is the IEEE standard associated with Gigabit Ethernet?
To allow remote management of the switch.
Network
802.3ab and 802.3z
Configure the switch so that it has lower priority than other switches in the network
5. The Certkiller network administrator wants to use a router named CK1 to segment the local network. What are some of the advantages of using CK1 to segment the network? (Choose two)
TCP
Auto - On - and Desirable
Buffering - Cut-through - and Congestion avoidance
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
6. The Certkiller LAN is upgrading all devices to operate in full duplex. Which statement is true about full-duplex Ethernet in comparison to half-duplex Ethernet?
Data link
An additional broadcast domain will be created.
Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
7. A Certkiller Ethernet switch receives a unicast frame with a destination MAC that IS listed in the switch table. What will this switch do with the frame?
The switch will forward the frame to a specific port
Encapsulations PPP and authentication CHAP
Telnet and FTP
Layer 4
8. Cisco is the leader in the router market space. What basic functions do their routers perform in a network?
Layer 3
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
Path selections and Packet switching.
VTP
9. Which of the following correctly describe the various functions and virtues of a router?
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
Packet switching - Packet filtering and Internetwork communication.
Duplex mismatch
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
10. On a half-duplex Ethernet LAN - two hosts attempt to send data simultaneously - resulting in a collision. Following this collision - what will the hosts do?
An electrical pulse indicates that the collision has cleared.
Layer 3
Port security
Serial0/1 is down - line protocol is down
11. Split horizon has been enabled within the Certkiller routed network. Which one of the following statements best explains the split horizon rule?
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
Switches - Bridges - and Routers
It will prevent segment 1's broadcasts from getting to segment 2.
Information about a route should never be sent back in the direction from which the original update came.
12. Which three of the protocols below belong to the application layer? (Select three answer choices)
HTTPS - SMTP - and TFTP
Transport
802.1Q and ISL
Telnet and FTP
13. Some of the older Certkiller switches store the entire frame before forwarding it to the destination. What are two effects on network performance of configuring a switch to do this?
Increased latency and Filtering of all frame errors
Layer 4
The network layer
The switch will forward the frame to a specific port
14. Which of the following commands would be applied to a WAN interface - but not on LAN Interface?
Application
Layer 3
It operates without collisions and It provides faster data transfer
Encapsulations PPP and authentication CHAP
15. When comparing and contrasting the similarities and differences between bridges and switches - which of the following are valid statements?
They can provide hosts with information about network problems. and They are encapsulated within IP datagrams.
In an improperly implemented redundant topology
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
CertK Switch(config)# ip default-gateway 192.168.1.115
16. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
Auto - Desirable - and On
This is an Ethernet port operating at half duplex
Decrease the window size.
Data link
17. Which of the following services use TCP?
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
SMTP FTP and HTTP
VTP will allow switches to share VLAN configuration information
Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth
18. Certkiller has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?
100 meters
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
VTP will allow switches to share VLAN configuration information
Switches increase the number of collision domains in the network.
19. Both the switches and hubs are being utilized within the CK network. Which of the following is true regarding the use of switches and hubs for the network connectivity in this network?
SMTP FTP and HTTP
Switches increase the number of collision domains in the network.
Serial0/1 is down - line protocol is down
ARP and ICMP
20. You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network?
Congestion avoidance - Windowing and Buffering
A cross-over cable
Port security
It operates without collisions and It provides faster data transfer
21. With regard to Ethernet media access methods - which of the following are true?
VLAN and Swtich
It is used to prevent switching loops in networks with redundant switched routes.
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
It is the sum of the costs based on bandwidth
22. CDP is being used trhoughout the CK network. What are two reasons why the CK network administrator would use CDP?
A cross-over cable
Path selections and Packet switching.
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
23. As a CCNA candidate - you must know the various layers of the OSI model. At which layers of the OSI model do Wide Area Networks operate in?
Physical Layer and Datalink Layer
A hub and A repeater.
The switch will forward the frame to a specific port
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
24. Which two of the following values does STP take into consideration when it elects the root bridge?
Physical Layer and Datalink Layer
The Bridgeg ID and The bridge priority
Show cdp neighbor detail
Switches - Bridges - and Routers
25. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
802.3ab and 802.3z
It will prevent segment 1's broadcasts from getting to segment 2.
Port security
Application
26. You need to perform some initial configuration tasks on a new Certkiller switch. What is the purpose of assigning an IP address to a switch?
This is an Ethernet port operating at half duplex
Decrease the window size.
To allow remote management of the switch.
Layer 3
27. You have set up an Internet based FTP server - where people can upload and download files. In terms of the OSI model - What is the highest layer used during the FTP sessions.
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
VTP will allow switches to share VLAN configuration information
Application
Switches increase the number of collision domains in the network.
28. Which of the protocols below - operates at Layer 2 of the OSI model - and is used to maintain a loop-free network?
All switch and bridge ports are in either the forwarding or blocking state.
Encapsulations PPP and authentication CHAP
STP
Too many hosts in a broadcast domain - Broadcast storms and Low bandwidth
29. Which OSI layer header contains the address of a destination host that is on another network?
Network
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
VTP will allow switches to share VLAN configuration information
Auto - Desirable - and On
30. While troubleshooting a connectivity problem on the network - you issure the ping command from your PC command prompt - but the output shows 'request times out' At which OSI layer is this problem associated with?
The network layer
Layer 4
Switches - Bridges - and Routers
A hub and A repeater.
31. Two buildings on the London campus of a CK corporation must be connected to use Ethernet with a bandwidth of at least 100 Mbps. CK is concerned about possible problems from voltage potential differences between the two buldings. Which media type shou
Fiber optic cable.
Layer 4
SMTP FTP and HTTP
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
32. when files are transferred between a host and an FTP server - the data is divided into smaller pieces of transmission. As these pieces arrive at the destination host they must be reassembled to reconstruct the original file. What provides for the rea
Data link
Congestion avoidance - Windowing and Buffering
The sequence number in the TCP header.
HTTPS - SMTP - and TFTP
33. Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?
Certkiller B > trace
Congestion avoidance - Windowing and Buffering
Decrease the window size.
Information about a route should never be sent back in the direction from which the original update came.
34. Which line from the output of the show ip interface command indicates that there is a Layer 1 problem?
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
Serial0/1 is down - line protocol is down
The network layer
35. A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role of the Root Bridge?
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
Configure the switch so that it has a lower priority than other switches in the network.
An electrical pulse indicates that the collision has cleared.
A broadcast domain with too many hosts - Broadcast storms - and Low bandwidth
36. An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location?
The network layer
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
All switch and bridge ports are in either the forwarding or blocking state.
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
37. By default - which of the following factors determines the spanning-tree path cost?
Port security
Hosts use a logical bus topology
It is the sum of the costs based on bandwidth
An additional broadcast domain will be created.
38. Which fields are included in the TCP header?
Switches increase the number of collision domains in the network.
Source Port - Acknowledgment Number - and Window
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth
39. You are experiencing intermittent issues relating to congestion within the Certkiller network. What are the possible causes of congestion on this LAN?
The network layer
Hosts use a logical bus topology
A broadcast domain with too many hosts - Broadcast storms - and Low bandwidth
802.3ab and 802.3z
40. When a switch port is used as a VLAN trunk - which of the following trunk modes are valid?
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
The interfaces must be configured for NAT.
Auto - Desirable - and On
802.3ab and 802.3z
41. You want to upgrade the Certkiller LAN so that all ports operate in full duplex mode. Which statement is true about full-duplex Ethernet when comparing to half-duplex Ethernet?
To allow remote management of the switch.
Information about a route should never be sent back in the direction from which the original update came.
This is an Ethernet port operating at half duplex
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
42. Which layer of the OSI reference model is responsible for ensuring reliable end to end delivery of data?
Telnet and FTP
Transport
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
43. While troubleshooting a network connectivity problem - a Certkiller technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However - when the ping command is issued from the works
Duplex mismatch
The network layer
It is used to prevent switching loops in networks with redundant switched routes.
Switches increase the number of collision domains in the network.
44. CDP is running between two CK devices. What information is supplied by CDP?
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
Serial0/1 is down - line protocol is down
Device Identifiers - Capabilities list - Platform
The system is malfunctioning.
45. As a CCNA candidate - you will be expected to know the OSI model very well. Which of the following are associated with the application layer (layer 7) of the OSI model?
100 meters
STP
Telnet and FTP
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
46. Two stations on the Certkiller LAN transmit at the same time - resulting in a collision. What happens when a collision occurs on the network?
TCP
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
In an improperly implemented redundant topology
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
47. At which OSI layer is a logical path created between two host systems named CK1 and CK2 on the Certkiller LAN?
Network
A cross-over cable
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
MAC Address and Bridge Priority
48. Certkiller users have noticed extremely slow network performance - intermittent connectivity - and connection losses. After entering the 'show interfaces' command - you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that
Source Port - Acknowledgment Number - and Window
Path selections and Packet switching.
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
Duplex mismatch
49. At which layer of the OSI model does the protocol that provides the information displayed by the 'show cdp neighbors' command operate?
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
Switches increase the number of collision domains in the network.
Auto - On - and Desirable
Data link
50. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?
Serial0/1 is down - line protocol is down
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
The interfaces must be configured for NAT.