SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
To facilitate the entry and exit of data on media.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Network portion
2. What is the primary function of encapsulating packets into frames?
The physical address is added.
To facilitate the entry and exit of data on media.
To enable a receiving host to forward the data to the appropriate application.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
3. What can you identify when you examine the Network Layer header?
The destination host address.
Identify the device that allows local network computers to communicate w/ devices in other networks.
Flash
A. MTA b. SMTP
4. What do end devices do?
Originate data flow.
Next-Hop Address
255.255.255.0
Twisting of the cables
5. What is a disadvantage of Telnet?
It does not support encryption.
The physical address is added.
To prevent the receiver from being overwhelmed by incoming data.
OTDR
6. 3 common problems w/ a large network
A. addressing b. error detection c. frame delimiting
Application Layer
A. purpose b. geographic location c. ownership
A. performance degradation b. security issues c. host identification
7. 3 measures of data transfer
A. goodput b. throughput c. bandwidth
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
0 to 1023
As the commands are entered.
8. During a TCP session - if packets arrive out of order - what will happen?
Console
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
The packets will be delivered and reassembled at destination.
80 (HTTP)
9. What statements describe the logical token-passing topology?
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
UTP
10. Where is the IOS file stored at?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A default gateway (router).
Flash
Originate data flow.
11. When is a straight-through cable used in a network?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. goodput b. throughput c. bandwidth
80 (HTTP)
When connecting a host to a switch.
12. Important characteristic of UDP
SSH
Minimal delays in data delivery.
The packets will be delivered and reassembled at destination.
A random delay helps prevent the stations from experiencing another collision during transmission.
13. What describes the purpose of default route?
Logical Link Control sublayer
Network Layer
Signal loss can be experienced.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
14. After an ethernet collision - which device has priority to transmit data?
Any device whose backoff timer expires first.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Rollover cable
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
15. What are 3 pieces of info about a route contained in a routing table?
A. next-hop b. metric/interface c. destination network address
It does not support encryption.
Show Interfaces
The packets will be delivered and reassembled at destination.
16. What correctly describes a MAC address?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. perform degradation b. security issues c. host identification
The packets will be delivered and reassembled at destination.
Host A
17. Why is flow control used for TCP data transfer?
A default gateway (router).
To prevent the receiver from being overwhelmed by incoming data.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
18. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
SMB
A physical topology.
A. performance degradation b. security issues c. host identification
Originate data flow.
19. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
Network Layer Packet
Show Interfaces
Console
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
20. What is the purpose of a default gateway?
A. Physical b. Data Link
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. servers b. routers c. network printers
Supports error detection.
21. What method of signal transmission uses radio waves to carry signals?
Wireless
It has expanded adressing capabilities.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. DNS b. SMTP c. POP
22. Intermediary devices used to implement security between networks
Destination is not contacted before a packet is sent.
A. larger address space b. data types and classes of service c. authentication and encryption
A. router b. firewall
The packets will be delivered and reassembled at destination.
23. At which layer of the TCP/IP model does ethernet operate?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
To prevent the receiver from being overwhelmed by incoming data.
Network Access
A. servers b. routers c. network printers
24. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Network
To prevent the receiver from being overwhelmed by incoming data.
80 (HTTP)
25. What can get you to an outside network?
255.255.255.0
Ctrl + Shift + 6
A default gateway (router).
Logical Link Control sublayer
26. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
172.16.192.160
UTP
27. What are 3 common problems w/ large networks?
A. perform degradation b. security issues c. host identification
Identify the device that allows local network computers to communicate w/ devices in other networks.
Network address
Is used by the server to resolve names.
28. There are too many broadcasts on switches - what can be done?
A. replace a switch w/ a router b. subnet the new networks
It does not support encryption.
Host A
The magnetic field around the adjacent pairs of wire.
29. On a ethernet segment - why do hosts that experience a collision use a random delay before attempting to transmit?
Fiber
A. application b. services
A random delay helps prevent the stations from experiencing another collision during transmission.
A. non-deterministic b. less overhead c. collisions exist
30. statements of IP adressing
Logical Link Control sublayer
A. router b. firewall
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. DB 60 b. Winchester 15-pin c. smart serial
31. When do changes take effect in a Cisco router?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
UTP
Destination Network Address
As the commands are entered.
32. What is the purpose of the preamble in an ethernet frame?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. application b. services
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
33. What is the purpose of resource records in DNS?
Is used by the server to resolve names.
It provides interface between applications on either end of the network.
A. router b. firewall
A. netstat -r b. route PRINT
34. 3 functions of the upper data link sublayer in the OSI model
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Network Layer Packet
Window Size
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
35. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
Binary ANDing
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Router
Originate data flow.
36. What is PDU?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Is a layer of specific encapsulation.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. Physical b. Data Link
37. What are 2 email components used to forward mail between servers?
FTP
2046
A. MTA b. SMTP
Router
38. What are 2 forms of application layer software?
A. application b. services
8
Network
A physical topology.
39. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
Host mobility
UTP
OTDR
Supports error detection.
40. What do you need to use for an initial configuration on a Cisco router?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Console interface
TCP initializes the sequence numbers for the sessions.
The magnetic field around the adjacent pairs of wire.
41. 3 characteristics of valid Ethernet Layer 2 addresses
Transport
Router(config)# interface FastEthernet 0/1
Application Layer
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
42. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
Host A
32 bits
A. identifies the communicating applications b. identifies multiple conversations between the hosts
It has expanded adressing capabilities.
43. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
Rollover cable
The MAC protocol can be very simple.
Source Port
2046
44. What is the primary rope of the physical layer in transmitting data?
It reduces unnecessary broadcasts.
Create signals that represent the bits in each frame for the media.
A default gateway (router).
IP Protocol
45. 3 protocols that operate in the application layer
To enable a receiving host to forward the data to the appropriate application.
They must wait until the first hosts finish transfering the media.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. DNS b. SMTP c. POP
46. What characteristic of an UTP helps reduce interference?
The physical address is added.
Twisting of the cables
FTP
A default gateway (router).
47. How many bits make up an IPv4 address?
A. addressing b. error detection c. frame delimiting
32 bits
To enable a receiving host to forward the data to the appropriate application.
A. larger address space b. data types and classes of service c. authentication and encryption
48. Which IP packet field will prevent endless loops?
A. Cat5 UTP b. Cat6 UTP
Time-to-live (TTL)
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. they initiate data exchanges b. they may upload data to servers
49. What is the purpose of the TCP/IP Network Application Layer?
Network Media Control
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. they initiate data exchanges b. they may upload data to servers
When connecting a host to a switch.
50. What type of network cable is used between a terminal and a console port?
Rollover cable
The destination host address.
Source and Destination IP address
A. it has centralized administration b. security is easier to enforce