SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
Resolve IPv4 addresses to MAC addresses.
Show Interfaces
8
Wireless
2. 3 common problems w/ a large network
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. DNS b. SMTP c. POP
A. goodput b. throughput c. bandwidth
A. performance degradation b. security issues c. host identification
3. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Create signals that represent the bits in each frame for the media.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. show startup-config b. show running-config
4. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
No collisions will occur on this link.
When connecting a host to a switch.
Network address
A. replace a switch w/ a router b. subnet the new networks
5. Why is flow control used for TCP data transfer?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
It provides for the exchange of data over a common local media.
To prevent the receiver from being overwhelmed by incoming data.
Source Port
6. When is a straight-through cable used in a network?
When connecting a host to a switch.
Is used by the server to resolve names.
It does not support encryption.
A. addressing b. error detection c. frame delimiting
7. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
UDP
A. show startup-config b. show running-config
Show Interfaces
A. goodput b. throughput c. bandwidth
8. What is the proper order of the OSI Layers?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
80 (HTTP)
A. application b. presentation c. session d. transmision e. network f. data link g. physical
9. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Network Access
Hub
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
10. What 2 type of cables would most commonly be used for new runs?
A. Cat5 UTP b. Cat6 UTP
They must wait until the first hosts finish transfering the media.
Fiber
A. Physical b. Data Link
11. What do end devices do?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. purpose b. geographic location c. ownership
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Originate data flow.
12. 2 features that make switches preferable to hubs
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. minimizing of collisions b. division into broadcast domains
A. perform degradation b. security issues c. host identification
8
13. 3 factors that should be considered when implementing Layer 2 protocols
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
FTP
Supports error detection.
14. Which combination of keys can be used to interrupt a ping or traceroute process?
Is used by the server to resolve names.
Flash
A random delay helps prevent the stations from experiencing another collision during transmission.
Ctrl + Shift + 6
15. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
It provides for the exchange of data over a common local media.
A. MTA b. SMTP
80 (HTTP)
255.255.255.224
16. At which layers of the OSI model does ethernet operate?
No collisions will occur on this link.
It does not support encryption.
A. physical layer b. DLL layer
Hub
17. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. flow control b. session establishment c. numbering and sequencing
Window Size
SMB
18. What can get you to an outside network?
Router
A default gateway (router).
Destination is not contacted before a packet is sent.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
19. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Rollover cable
RJ-45
Physical
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
20. What are 2 protocols for transfering web resources?
Network Layer Packet
A. copper UTP b. optical fiber
It uses lasers as the light source.
A. HTTP b. HTTPS
21. 3 primary functions of the data link layer encapsulation
Is a layer of specific encapsulation.
Time-to-live (TTL)
A. addressing b. error detection c. frame delimiting
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
22. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
A. it has centralized administration b. security is easier to enforce
255.255.255.0
A. they initiate data exchanges b. they may upload data to servers
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
23. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
They must wait until the first hosts finish transfering the media.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. Physical b. Data Link
24. What do the intermediary devices in the network do?
Source and Destination IP address
The MAC protocol can be very simple.
A. purpose b. geographic location c. ownership
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
25. What are 2 email components used to forward mail between servers?
A. MTA b. SMTP
Signal loss can be experienced.
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
26. What is the primary reason for developing IPv6?
It has expanded adressing capabilities.
Network Layer
Network Media Control
TCP initializes the sequence numbers for the sessions.
27. Group of hosts that have identical bit patterns in the high order bits of their addresses
Source and Destination IP address
A. router b. firewall
Switch
Network
28. What method of signal transmission uses radio waves to carry signals?
A. next-hop b. metric/interface c. destination network address
Wireless
A. DNS b. SMTP c. POP
Network Media Control
29. What is dinamically selected by the source host when forwarding data?
IP Protocol
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. Cat5 UTP b. Cat6 UTP
Source Port
30. How many bits make up an IPv4 address?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
32 bits
Source and Destination Ports
SMB
31. Default Gateway is incorrect on the host - What is the impact on the communications?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. perform degradation b. security issues c. host identification
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
The address of the router that the host will use to 'get to the other side'.
32. 2 characteristics of clients in data networks
Any device whose backoff timer expires first.
Ctrl + Shift + 6
A. they initiate data exchanges b. they may upload data to servers
A. replace a switch w/ a router b. subnet the new networks
33. Which IP packet field will prevent endless loops?
FTP
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
The address of the router that the host will use to 'get to the other side'.
Time-to-live (TTL)
34. 3 facts about the network portion of an IPv4 address
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
172.16.192.160
A backbone cable.
To enable a receiving host to forward the data to the appropriate application.
35. 3 features of IPv6
A. larger address space b. data types and classes of service c. authentication and encryption
It does not support encryption.
0 to 1023
Next-Hop Address
36. When a device is moved from one network to the other...?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
UTP
Collisions can decrease network performance.
37. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Destination is not contacted before a packet is sent.
SSH
Hosts return to listen-before-transmit mode.
To enable a receiving host to forward the data to the appropriate application.
38. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
A. performance degradation b. security issues c. host identification
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Console interface
Host A
39. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Window Size
Ctrl + Shift + 6
40. What connectors are commonly associated w/ Cisco's V.35 serial cables?
A. DB 60 b. Winchester 15-pin c. smart serial
A. MTA b. SMTP
A. addressing b. error detection c. frame delimiting
255.255.255.224
41. Statements that describe LAN
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Physical
Router
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
42. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Destination is not contacted before a packet is sent.
A. flow control b. session establishment c. numbering and sequencing
43. What causes crosstalk within cable pairs when using UTP?
A. DB 60 b. Winchester 15-pin c. smart serial
Rollover cable
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
The magnetic field around the adjacent pairs of wire.
44. During encapsulation - what happens in the Data Link Layer?
A. application b. presentation c. session d. transmision e. network f. data link g. physical
OTDR
The physical address is added.
80 (HTTP)
45. 3 measures of data transfer
A. perform degradation b. security issues c. host identification
A. goodput b. throughput c. bandwidth
A. they initiate data exchanges b. they may upload data to servers
Collisions can decrease network performance.
46. How does the application layer on a server process multiple client requests for services?
They must wait until the first hosts finish transfering the media.
It uses support from the lower layers to distinguish between connections to the service.
The physical address is added.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
47. What networking devices are recommended to be assigned static IP addresses?
Minimal delays in data delivery.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. servers b. routers c. network printers
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
48. What is a characteristic of a single-mode fiber-optic cable?
Network
The magnetic field around the adjacent pairs of wire.
It uses lasers as the light source.
Hub
49. What are 2 common characteristics associated w/ dynamic routing protocols?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. addressing b. error detection c. frame delimiting
50. Which device is used to create or divide broadcast domains?
Router
Router(config)# interface FastEthernet 0/1
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device