SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What characteristic of an UTP helps reduce interference?
To prevent the receiver from being overwhelmed by incoming data.
Twisting of the cables
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
IP is not properly installed
2. 2 characteristics of peer-2-peer
A. decentralized resources b. resource sharing w/o a dedicated server
The packets will be delivered and reassembled at destination.
A. copper UTP b. optical fiber
Identify the device that allows local network computers to communicate w/ devices in other networks.
3. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
FTP
Source and Destination IP address
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Fiber
4. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
UTP
Twisting of the cables
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
RJ-45
5. What are 2 protocols for transfering web resources?
Supports error detection.
A. purpose b. geographic location c. ownership
A. HTTP b. HTTPS
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
6. Why is flow control used for TCP data transfer?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
172.16.192.160
To prevent the receiver from being overwhelmed by incoming data.
7. What is a characteristic of a single-mode fiber-optic cable?
Fiber
It uses lasers as the light source.
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Identify the device that allows local network computers to communicate w/ devices in other networks.
8. 3 functions of the upper data link sublayer in the OSI model
A default gateway (router).
Resolve IPv4 addresses to MAC addresses.
A. router b. firewall
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
9. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
The magnetic field around the adjacent pairs of wire.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. netstat -r b. route PRINT
10. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
A. decentralized resources b. resource sharing w/o a dedicated server
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Window Size
A. hot keys b. context-sensitive c. command syntax check
11. What do the intermediary devices in the network do?
Is a layer of specific encapsulation.
A. HTTP b. HTTPS
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Show Interfaces
12. What is a characteristic of a logical point-to-point topology?
A. router b. firewall
The MAC protocol can be very simple.
Destination Network Address
A default gateway (router).
13. What method of signal transmission uses radio waves to carry signals?
A backbone cable.
255.255.255.224
8
Wireless
14. What info is found in the TCP and UDP header info?
Source and Destination Ports
Network Access
Network address
It provides interface between applications on either end of the network.
15. What is the role of the OSI Application Layer?
Hosts return to listen-before-transmit mode.
It provides interface between applications on either end of the network.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
16. What is PDU?
Is a layer of specific encapsulation.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. replace a switch w/ a router b. subnet the new networks
17. What command can be used to determine if the router has experienced any input or output errors?
Router(config)# interface FastEthernet 0/1
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
When connecting a host to a switch.
Show Interfaces
18. What are 3 pieces of info about a route contained in a routing table?
A. replace a switch w/ a router b. subnet the new networks
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Network address
A. next-hop b. metric/interface c. destination network address
19. Where is the IOS file stored at?
Flash
Network Layer
A default gateway (router).
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
20. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Application Layer
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Identify processes or services that are communicating with end devices.
Physical
21. 2 features that make switches preferable to hubs
Source and Destination IP address
Host mobility
A. minimizing of collisions b. division into broadcast domains
Binary ANDing
22. 3 statements about the role of routers in the network
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Network address
A. decentralized resources b. resource sharing w/o a dedicated server
A. Physical b. Data Link
23. 3 primary functions of the data link layer encapsulation
Network Media Control
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. addressing b. error detection c. frame delimiting
80 (HTTP)
24. What does the IEEE 802.2 standard represent in Ethernet technologies?
The address of the router that the host will use to 'get to the other side'.
Logical Link Control sublayer
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Network address
25. What is the primary purpose of Layer 4?
Identify processes or services that are communicating with end devices.
They must wait until the first hosts finish transfering the media.
A. flow control b. session establishment c. numbering and sequencing
IP is not properly installed
26. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
Fiber
IP Protocol
To enable a receiving host to forward the data to the appropriate application.
172.16.192.160
27. 3 statements about routes and their use
Hosts return to listen-before-transmit mode.
A. decentralized resources b. resource sharing w/o a dedicated server
A. copper UTP b. optical fiber
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
28. Statements that describe LAN
Is used by the server to resolve names.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
8
A. HTTP b. HTTPS
29. How does the application layer on a server process multiple client requests for services?
8
It uses support from the lower layers to distinguish between connections to the service.
Console interface
A. non-deterministic b. less overhead c. collisions exist
30. 2 functions of encapsulation
A. router b. firewall
A. it has centralized administration b. security is easier to enforce
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A random delay helps prevent the stations from experiencing another collision during transmission.
31. 3 facts about the network portion of an IPv4 address
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
0 to 1023
Router(config)# hostname Costas
A random delay helps prevent the stations from experiencing another collision during transmission.
32. Group of hosts that have identical bit patterns in the high order bits of their addresses
Is a layer of specific encapsulation.
A. it has centralized administration b. security is easier to enforce
Wireless
Network
33. What are 3 common problems w/ large networks?
Router(config)# interface FastEthernet 0/1
A. perform degradation b. security issues c. host identification
Signal loss can be experienced.
Show Interfaces
34. What can get you to an outside network?
As the commands are entered.
A. next-hop b. metric/interface c. destination network address
Network portion
A default gateway (router).
35. Which combination of keys can be used to interrupt a ping or traceroute process?
Any device whose backoff timer expires first.
Hub
A. physical layer b. DLL layer
Ctrl + Shift + 6
36. What command is used to change the default name to 'Costas'?
The MAC protocol can be very simple.
Router(config)# hostname Costas
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Application Layer
37. If you have a small network w/ 3 computers...
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
IP Protocol
The physical address is added.
38. If there is a graphic representation of a company network wiring and equipment - What is this called?
It uses support from the lower layers to distinguish between connections to the service.
To prevent the receiver from being overwhelmed by incoming data.
To enable a receiving host to forward the data to the appropriate application.
A physical topology.
39. What layer encapsulates segments into packets?
It provides interface between applications on either end of the network.
Network Layer
A. non-deterministic b. less overhead c. collisions exist
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
40. What is an automated service that matches resource names w/ required IP addresses?
Transport
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
DNS
Is a layer of specific encapsulation.
41. What type of routing uses information that is manually entered into the routing table?
Static
Network address
Collisions can decrease network performance.
255.255.255.224
42. Which characteristics describe fiber optic cable?
A. perform degradation b. security issues c. host identification
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. router b. firewall
43. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
Source Port
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
The MAC protocol can be very simple.
Transport
44. When is a straight-through cable used in a network?
Host A
It does not support encryption.
When connecting a host to a switch.
SSH
45. What is the function of the DLL?
It provides for the exchange of data over a common local media.
Logical Link Control sublayer
Source and Destination IP address
Binary ANDing
46. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
Network Layer Packet
Logical Link Control sublayer
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Rollover cable
47. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
No collisions will occur on this link.
Rollover cable
IP is not properly installed
MAC
48. What statements describe the logical token-passing topology?
Originate data flow.
Time-to-live (TTL)
A. next-hop b. metric/interface c. destination network address
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
49. When a device is moved from one network to the other...?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Network Layer
A. hot keys b. context-sensitive c. command syntax check
Source Port
50. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
SMB
Flash