SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
Window Size
Source Port
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
MAC
2. 3 primary functions of the data link layer encapsulation
The MAC protocol can be very simple.
A. netstat -r b. route PRINT
A. addressing b. error detection c. frame delimiting
Binary ANDing
3. What is the primary reason for developing IPv6?
It has expanded adressing capabilities.
It does not support encryption.
Resolve IPv4 addresses to MAC addresses.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
4. What is the purpose of the preamble in an ethernet frame?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Host A
A. hot keys b. context-sensitive c. command syntax check
Time-to-live (TTL)
5. How does the application layer on a server process multiple client requests for services?
Router
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
It uses support from the lower layers to distinguish between connections to the service.
Network Access
6. When a network service fails - which port is most often used to access a router for management purposes?
FTP
A. decentralized resources b. resource sharing w/o a dedicated server
Console
Create signals that represent the bits in each frame for the media.
7. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
Binary ANDing
A. low overhead b. connectionless
UTP
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
8. 3 common problems w/ a large network
Hub
Network address
A. performance degradation b. security issues c. host identification
Next-Hop Address
9. What can be a problem that is reduced by adding end-to-end addressing?
It reduces unnecessary broadcasts.
IP is not properly installed
It uses support from the lower layers to distinguish between connections to the service.
A. perform degradation b. security issues c. host identification
10. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
Router(config)# interface FastEthernet 0/1
Create signals that represent the bits in each frame for the media.
Network Layer
A. show startup-config b. show running-config
11. What is the function of the DLL?
Destination is not contacted before a packet is sent.
It provides for the exchange of data over a common local media.
A. decentralized resources b. resource sharing w/o a dedicated server
Identify the device that allows local network computers to communicate w/ devices in other networks.
12. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Destination Network Address
As the commands are entered.
The packets will be delivered and reassembled at destination.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
13. 2 characteristics of peer-2-peer
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. decentralized resources b. resource sharing w/o a dedicated server
OTDR
A. media sharing b. logical topology
14. What is PDU?
A. flow control b. session establishment c. numbering and sequencing
A. router b. firewall
Is a layer of specific encapsulation.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
15. When do changes take effect in a Cisco router?
To enable a receiving host to forward the data to the appropriate application.
Hosts return to listen-before-transmit mode.
As the commands are entered.
It uses support from the lower layers to distinguish between connections to the service.
16. 3 functions of the upper data link sublayer in the OSI model
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
172.16.192.160
Console
The physical address is added.
17. 3 statements about the role of routers in the network
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Physical
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Static
18. What are the advantages of using a client-server model?
It provides interface between applications on either end of the network.
A. it has centralized administration b. security is easier to enforce
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
19. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
A. minimizing of collisions b. division into broadcast domains
Collisions can decrease network performance.
Fiber
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
20. If there is a graphic representation of a company network wiring and equipment - What is this called?
It provides interface between applications on either end of the network.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A physical topology.
A. minimizing of collisions b. division into broadcast domains
21. At which layer of the TCP/IP model does ethernet operate?
A. perform degradation b. security issues c. host identification
Router(config)# hostname Costas
Network Access
No collisions will occur on this link.
22. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
The physical address is added.
A. HTTP b. HTTPS
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Switch
23. Intermediary devices used to implement security between networks
Source and Destination Ports
Fiber
A. hot keys b. context-sensitive c. command syntax check
A. router b. firewall
24. Why are port numbers included in the TCP header of a segment?
Network portion
A. low overhead b. connectionless
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
To enable a receiving host to forward the data to the appropriate application.
25. What determines the method of media access control?
A. media sharing b. logical topology
The magnetic field around the adjacent pairs of wire.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Network Media Control
26. What correctly describes a MAC address?
32 bits
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Wireless
A. minimizing of collisions b. division into broadcast domains
27. What can get you to an outside network?
It does not support encryption.
A default gateway (router).
Twisting of the cables
172.16.192.160
28. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. HTTP b. HTTPS
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
29. What method of signal transmission uses radio waves to carry signals?
8
Static
Wireless
A. DNS b. SMTP c. POP
30. 3 statements of media acess control
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
FTP
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. addressing b. error detection c. frame delimiting
31. Important characteristic of UDP
The packets will be delivered and reassembled at destination.
Logical Link Control sublayer
Minimal delays in data delivery.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
32. What do you need to use for an initial configuration on a Cisco router?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Router(config)# hostname Costas
Console interface
To facilitate the entry and exit of data on media.
33. During a TCP session - if packets arrive out of order - what will happen?
Network Layer
The packets will be delivered and reassembled at destination.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
It has expanded adressing capabilities.
34. What is the primary function of encapsulating packets into frames?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
To facilitate the entry and exit of data on media.
SMB
It has expanded adressing capabilities.
35. 2 functions of encapsulation
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. enable mode b. priviledge executive mode
Router(config)# hostname Costas
No collisions will occur on this link.
36. What layer encapsulates segments into packets?
Console interface
Network Layer
Hosts return to listen-before-transmit mode.
UDP
37. There are too many broadcasts on switches - what can be done?
Next-Hop Address
Is used by the server to resolve names.
Flash
A. replace a switch w/ a router b. subnet the new networks
38. 3 protocols that operate in the application layer
172.16.192.160
TCP initializes the sequence numbers for the sessions.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. DNS b. SMTP c. POP
39. After an ethernet collision - which device has priority to transmit data?
Binary ANDing
Any device whose backoff timer expires first.
A. Cat5 UTP b. Cat6 UTP
A. physical layer b. DLL layer
40. Which 2 options represent Layer 4 addressing?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Binary ANDing
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. physical layer b. DLL layer
41. Which type of cable is most often associated w/ fiber-optic cable?
As the commands are entered.
IP Protocol
Router(config)# interface FastEthernet 0/1
A backbone cable.
42. What are 2 features of User Diagram Protocol (UDP)?
Router
A. low overhead b. connectionless
The physical address is added.
A. replace a switch w/ a router b. subnet the new networks
43. When is a straight-through cable used in a network?
Hub
Resolve IPv4 addresses to MAC addresses.
When connecting a host to a switch.
Network
44. 3 features that allow TCP to realibly and accurately track the transmission of data
A. flow control b. session establishment c. numbering and sequencing
RJ-45
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Is a layer of specific encapsulation.
45. What event occurs during the 3-way handshake?
A. show startup-config b. show running-config
Ctrl + Shift + 6
TCP initializes the sequence numbers for the sessions.
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
46. Which portion of the network layer address does a router use to forward packets?
The magnetic field around the adjacent pairs of wire.
A. next-hop b. metric/interface c. destination network address
Network portion
A. application b. presentation c. session d. transmision e. network f. data link g. physical
47. 3 characteristics of valid Ethernet Layer 2 addresses
Flash
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
The packets will be delivered and reassembled at destination.
Hosts return to listen-before-transmit mode.
48. 3 features of IPv6
A. larger address space b. data types and classes of service c. authentication and encryption
They must wait until the first hosts finish transfering the media.
A. next-hop b. metric/interface c. destination network address
172.16.192.160
49. Which layer supplies services and allows user interface?
Network Media Control
Supports error detection.
Application Layer
Any device whose backoff timer expires first.
50. Which device is used to create or divide broadcast domains?
The physical address is added.
A. DNS b. SMTP c. POP
Router
A. hot keys b. context-sensitive c. command syntax check