SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Hard
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following are spanning tree port states?
Learning - Listening - and Forwarding
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
They can provide hosts with information about network problems. and They are encapsulated within IP datagrams.
2. Which two of the following values does STP take into consideration when it elects the root bridge?
Application
STP
The Bridgeg ID and The bridge priority
ARP and ICMP
3. Which protocol uses TCP port 443 at layer 4?
HTTPS
802.1Q and ISL
Fiber optic cable.
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
4. What is the purpose of the spanning-tree algorithm in a switched LAN?
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
To prevent switching loops in networks with redundant switched paths.
Device Identifiers - Capabilities list - Platform
Sequence number - Window size - and Acknowledgment number
5. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
Port security
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
Application
6. The Certkiller network administrator needs to a switch named CK1 to become the root bridge for a redundant path switched network. What can be done to ensure that CK1 will always assume the role as the root bridge?
This is an Ethernet port operating at half duplex
Device Identifiers - Capabilities list - Platform
Configure the switch so that it has lower priority than other switches in the network
Buffering - Cut-through - and Congestion avoidance
7. Which of following VLAN frame encapsulation types are configurable on a Cisco switch?
802.1Q and ISL
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
Data link
An additional broadcast domain will be created.
8. A new switch is installed in the Certkiller network. This switch is to be configured so that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network. Which of the conditions below have to be met in o
Application
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
HTTPS
TCP
9. A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role of the Root Bridge?
Duplex mismatch
Configure the switch so that it has a lower priority than other switches in the network.
Source Port - Acknowledgment Number - and Window
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
10. A Certkiller switch is configured with all ports assigned to VLAN 2. In addition - all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?
Switches increase the number of collision domains in the network.
Physical Layer and Datalink Layer
MAC Address and Bridge Priority
An additional broadcast domain will be created.
11. ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets?
Certkiller B > trace
Hosts use a logical bus topology
They can provide hosts with information about network problems. and They are encapsulated within IP datagrams.
In an improperly implemented redundant topology
12. Certkiller has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?
The switch will forward the frame to a specific port
A cross-over cable
A broadcast address will never be the source address of a frame
VTP will allow switches to share VLAN configuration information
13. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
The sequence number in the TCP header.
To allow remote management of the switch.
STP
14. The corporate head office of Certkiller has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence - wh
Decrease the window size.
STP
Hosts use a logical bus topology
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
15. You want to influence the root bridge selection within the Certkiller LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)
A cross-over cable
Network
Data link
MAC Address and Bridge Priority
16. On a half-duplex Ethernet LAN - two hosts attempt to send data simultaneously - resulting in a collision. Following this collision - what will the hosts do?
An electrical pulse indicates that the collision has cleared.
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
They can provide hosts with information about network problems. and They are encapsulated within IP datagrams.
Application
17. CK1 is a switch in the Certkiller network. Why will CK1 never learn the broadcast address?
A broadcast address will never be the source address of a frame
Congestion avoidance - Windowing and Buffering
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
18. Which of the protocols below - operates at Layer 2 of the OSI model - and is used to maintain a loop-free network?
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
STP
CertK Switch(config)# ip default-gateway 192.168.1.115
VTP will allow switches to share VLAN configuration information
19. You are experiencing intermittent issues relating to congestion within the Certkiller network. What are the possible causes of congestion on this LAN?
A broadcast address will never be the source address of a frame
A broadcast domain with too many hosts - Broadcast storms - and Low bandwidth
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
A cross-over cable
20. You need to perform some initial configuration tasks on a new Certkiller switch. What is the purpose of assigning an IP address to a switch?
VTP will allow switches to share VLAN configuration information
Switches increase the number of collision domains in the network.
To allow remote management of the switch.
This is an Ethernet port operating at half duplex
21. While troubleshooting a network connectivity problem - a Certkiller technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However - when the ping command is issued from the works
Layer 4
The network layer
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
It will prevent segment 1's broadcasts from getting to segment 2.
22. With regard to Ethernet media access methods - which of the following are true?
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
A broadcast address will never be the source address of a frame
An electrical pulse indicates that the collision has cleared.
23. As the Certkiller network administrator - you are required to have a firmunderstanding of the OSI model. Why does the data communication industry use the layered OSI reference model?
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
Port security
24. Which line from the output of the show ip interface command indicates that there is a Layer 1 problem?
Auto - On - and Desirable
Serial0/1 is down - line protocol is down
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
Duplex mismatch
25. Both the switches and hubs are being utilized within the CK network. Which of the following is true regarding the use of switches and hubs for the network connectivity in this network?
Switches increase the number of collision domains in the network.
An additional broadcast domain will be created.
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
Layer 3
26. When you compare the differences between half-duplex and full-duplex Ethernet - which of the following characteristics are exclusive to half-duplex?
Switches increase the number of collision domains in the network.
In an improperly implemented redundant topology
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
Device Identifiers - Capabilities list - Platform
27. What kind of cable should be used to establish a trunked line between two Catalyst switches?
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
Packet switching - Packet filtering and Internetwork communication.
A cross-over cable
28. As a CCNA candidate - you will be expected to know the OSI model very well. Which of the following are associated with the application layer (layer 7) of the OSI model?
Telnet and FTP
Path selections and Packet switching.
Layer 3
Fiber optic cable.
29. A Certkiller technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the sh
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
Auto - On - and Desirable
Data link
The system is malfunctioning.
30. Which three statements are true about the operation of a full-duplex Ethernet network - which is being used in the Certkiller LAN?
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
Auto - On - and Desirable
31. Two stations on the Certkiller LAN transmit at the same time - resulting in a collision. What happens when a collision occurs on the network?
802.1Q and ISL
Sequence number - Window size - and Acknowledgment number
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
Network
32. You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network?
Congestion avoidance - Windowing and Buffering
A broadcast address will never be the source address of a frame
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
Data link
33. While troubleshooting a connectivity problem on the network - you issure the ping command from your PC command prompt - but the output shows 'request times out' At which OSI layer is this problem associated with?
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
Fiber optic cable.
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
The network layer
34. What is the IEEE standard associated with Gigabit Ethernet?
HTTPS - SMTP - and TFTP
Fiber optic cable.
802.3ab and 802.3z
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
35. The LAN needs are expanding at the CK corporate office - which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the CK network. Which of the following are layer 1 devices that you can use?
Port security
Configure the switch so that it has a lower priority than other switches in the network.
Buffering - Cut-through - and Congestion avoidance
A hub and A repeater.
36. when files are transferred between a host and an FTP server - the data is divided into smaller pieces of transmission. As these pieces arrive at the destination host they must be reassembled to reconstruct the original file. What provides for the rea
Learning - Listening - and Forwarding
Serial0/1 is down - line protocol is down
The sequence number in the TCP header.
The system is malfunctioning.
37. You have set up an Internet based FTP server - where people can upload and download files. In terms of the OSI model - What is the highest layer used during the FTP sessions.
Layer 4
Physical Layer and Datalink Layer
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
Application
38. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the Certkiller Switched LAN?
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
In an improperly implemented redundant topology
Switches increase the number of collision domains in the network.
The network layer
39. Some of the older Certkiller switches store the entire frame before forwarding it to the destination. What are two effects on network performance of configuring a switch to do this?
Increased latency and Filtering of all frame errors
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
ARP and ICMP
Data link
40. Although TCP segments are similar to UDP segments - TCP packets contains some additional fields. Which of the following are found in a TCP header - but not in a UDP header?
An additional broadcast domain will be created.
The interfaces must be configured for NAT.
Sequence number - Window size - and Acknowledgment number
Fiber optic cable.
41. Which OSI layer is associated with the following: The acknowledgment of transmissions - sequencing - and flow control across a network?
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
Learning - Listening - and Forwarding
It will prevent segment 1's broadcasts from getting to segment 2.
Layer 4
42. Which of the following can lead to the contribution of LAN traffic congestion?
Too many hosts in a broadcast domain - Broadcast storms and Low bandwidth
The Bridgeg ID and The bridge priority
CertK Switch(config)# ip default-gateway 192.168.1.115
Switches increase the number of collision domains in the network.
43. CDP is being used trhoughout the CK network. What are two reasons why the CK network administrator would use CDP?
HTTPS
Layer 3
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
44. Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?
Certkiller B > trace
The interfaces must be configured for NAT.
Physical Layer and Datalink Layer
An electrical pulse indicates that the collision has cleared.
45. Which of the following commands would be applied to a WAN interface - but not on LAN Interface?
Fiber optic cable.
An electrical pulse indicates that the collision has cleared.
Encapsulations PPP and authentication CHAP
The system is malfunctioning.
46. Which fields are included in the TCP header?
It will prevent segment 1's broadcasts from getting to segment 2.
An additional broadcast domain will be created.
Source Port - Acknowledgment Number - and Window
Layer 4
47. Certkiller is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions - the company needs to make sure that the phone traffic is on a different network
Port security
The sequence number in the TCP header.
An additional broadcast domain will be created.
VLAN and Swtich
48. As a Certkiller trainee you are required to set the default gateway on a Cisco switch to the IP address of 192.168.1.115. Which IOS command should you use?
A hub and A repeater.
CertK Switch(config)# ip default-gateway 192.168.1.115
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
Duplex mismatch
49. You are the administrator of the Certkiller LAN and you have been reviewing error logs of networking devices and notice a large number of errors associated with several MAC addresses. You suspect that some of the errors are being generated by the rou
Data link
Congestion avoidance - Windowing and Buffering
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
Show arp and Show interface
50. Which Layer 4 protocol is used for a Telnet connections between two CK routers?
802.1Q and ISL
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
TCP