SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a drawback of the CSMA/CD access method?
The MAC protocol can be very simple.
Router(config)# interface FastEthernet 0/1
Host mobility
Collisions can decrease network performance.
2. At which layers of the OSI model does ethernet operate?
A. media sharing b. logical topology
A. physical layer b. DLL layer
Destination Network Address
Hosts return to listen-before-transmit mode.
3. Important characteristic of UDP
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Minimal delays in data delivery.
4. What makes fiber preferable to copper for interconnecting buildings?
Identify processes or services that are communicating with end devices.
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A. minimizing of collisions b. division into broadcast domains
5. What are 2 email components used to forward mail between servers?
Wireless
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Rollover cable
A. MTA b. SMTP
6. What are 2 forms of application layer software?
Fiber
Network address
A. performance degradation b. security issues c. host identification
A. application b. services
7. What describes the purpose of default route?
Source Port
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
It has expanded adressing capabilities.
Next-Hop Address
8. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
Transport
Network portion
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
It provides interface between applications on either end of the network.
9. What does the IEEE 802.2 standard represent in Ethernet technologies?
A. application b. presentation c. session d. transmision e. network f. data link g. physical
0 to 1023
It uses support from the lower layers to distinguish between connections to the service.
Logical Link Control sublayer
10. How many bits make up an IPv4 address?
The address of the router that the host will use to 'get to the other side'.
32 bits
The packets will be delivered and reassembled at destination.
Binary ANDing
11. What is the purpose of the preamble in an ethernet frame?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
32 bits
A physical topology.
A. performance degradation b. security issues c. host identification
12. What information is added during encapsulation at OSI Layer 3?
Source and Destination IP address
Originate data flow.
Switch
A. media sharing b. logical topology
13. What is the purpose of the TCP/IP Network Application Layer?
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Switch
The address of the router that the host will use to 'get to the other side'.
Network Media Control
14. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
Network Layer Packet
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. low overhead b. connectionless
Is a layer of specific encapsulation.
15. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
Network Layer Packet
Hub
DNS
A. servers b. routers c. network printers
16. What are 3 common problems w/ large networks?
A. perform degradation b. security issues c. host identification
To prevent the receiver from being overwhelmed by incoming data.
A default gateway (router).
SSH
17. What are 2 common characteristics associated w/ dynamic routing protocols?
Transport
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
The packets will be delivered and reassembled at destination.
Application Layer
18. Which IP packet field will prevent endless loops?
Switch
Time-to-live (TTL)
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
19. 3 measures of data transfer
A. goodput b. throughput c. bandwidth
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Console
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
20. What is a characteristic of a logical point-to-point topology?
The MAC protocol can be very simple.
255.255.255.0
Create signals that represent the bits in each frame for the media.
A. it has centralized administration b. security is easier to enforce
21. An admin needs to keep contents private - which access method should he use?
SSH
Hosts return to listen-before-transmit mode.
OTDR
IP is not properly installed
22. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
Console
UDP
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Collisions can decrease network performance.
23. What is a characteristic of a single-mode fiber-optic cable?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
It uses lasers as the light source.
Wireless
24. What do the intermediary devices in the network do?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Minimal delays in data delivery.
Supports error detection.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
25. How does the application layer on a server process multiple client requests for services?
They must wait until the first hosts finish transfering the media.
Console
It uses support from the lower layers to distinguish between connections to the service.
DNS
26. After an ethernet collision - which device has priority to transmit data?
TCP initializes the sequence numbers for the sessions.
Any device whose backoff timer expires first.
OTDR
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
27. What are 2 protocols for transfering web resources?
A. HTTP b. HTTPS
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Host mobility
A. netstat -r b. route PRINT
28. Which 2 options represent Layer 4 addressing?
To enable a receiving host to forward the data to the appropriate application.
No collisions will occur on this link.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. identifies the communicating applications b. identifies multiple conversations between the hosts
29. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
Network
172.16.192.160
To prevent the receiver from being overwhelmed by incoming data.
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
30. 3 features that allow TCP to realibly and accurately track the transmission of data
Console interface
A. non-deterministic b. less overhead c. collisions exist
A. flow control b. session establishment c. numbering and sequencing
Console
31. What layer encapsulates segments into packets?
DNS
Destination Network Address
Network Layer
Hub
32. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
80 (HTTP)
DNS
Application Layer
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
33. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
UDP
Source and Destination Ports
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
34. What is dinamically selected by the source host when forwarding data?
Source Port
It provides for the exchange of data over a common local media.
Transport
Router
35. What determines the method of media access control?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. media sharing b. logical topology
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Source and Destination Ports
36. What is the primary reason for developing IPv6?
It has expanded adressing capabilities.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Network address
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
37. When a network service fails - which port is most often used to access a router for management purposes?
Console
Hosts return to listen-before-transmit mode.
80 (HTTP)
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
38. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Source and Destination IP address
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. low overhead b. connectionless
Hosts return to listen-before-transmit mode.
39. 3 primary functions of the data link layer encapsulation
Fiber
Network Media Control
A. addressing b. error detection c. frame delimiting
It does not support encryption.
40. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
IP is not properly installed
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Router(config)# interface FastEthernet 0/1
41. What command is used to change the default name to 'Costas'?
Router(config)# hostname Costas
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
To facilitate the entry and exit of data on media.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
42. What is the purpose of resource records in DNS?
Show Interfaces
Source Port
Is used by the server to resolve names.
Binary ANDing
43. 3 terms that define the forms of help available within the Cisco IOS
A. netstat -r b. route PRINT
UDP
8
A. hot keys b. context-sensitive c. command syntax check
44. What is PDU?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
UDP
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Is a layer of specific encapsulation.
45. What are the advantages of using a client-server model?
Is used by the server to resolve names.
0 to 1023
A. it has centralized administration b. security is easier to enforce
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
46. statements of IP adressing
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. non-deterministic b. less overhead c. collisions exist
A. minimizing of collisions b. division into broadcast domains
A. they initiate data exchanges b. they may upload data to servers
47. What can you identify when you examine the Network Layer header?
A. larger address space b. data types and classes of service c. authentication and encryption
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
The destination host address.
A. replace a switch w/ a router b. subnet the new networks
48. 3 characteristics of valid Ethernet Layer 2 addresses
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Router(config)# hostname Costas
A. DNS b. SMTP c. POP
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
49. During a TCP session - if packets arrive out of order - what will happen?
The packets will be delivered and reassembled at destination.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. larger address space b. data types and classes of service c. authentication and encryption
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
50. What is a default gateway address?