SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are key considering factors when grouping hosts into common networks?
A. purpose b. geographic location c. ownership
The destination host address.
Twisting of the cables
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
2. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
255.255.255.0
IP Protocol
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
3. What kind of problems are caused by excessive broadcast traffic on network segments?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Wireless
Network Media Control
A. low overhead b. connectionless
4. What 2 type of cables would most commonly be used for new runs?
Network Layer
A. it has centralized administration b. security is easier to enforce
A. Cat5 UTP b. Cat6 UTP
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
5. Intermediary devices used to implement security between networks
A. router b. firewall
Host A
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
It provides for the exchange of data over a common local media.
6. What is the role of MTA in handling email?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Logical Link Control sublayer
7. 2 features that make switches preferable to hubs
A. minimizing of collisions b. division into broadcast domains
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Host mobility
0 to 1023
8. What application layer protocol is used to support file transfers between client and server?
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A physical topology.
A random delay helps prevent the stations from experiencing another collision during transmission.
FTP
9. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
MAC
The address of the router that the host will use to 'get to the other side'.
Transport
Network
10. Which 2 options represent Layer 4 addressing?
It has expanded adressing capabilities.
Resolve IPv4 addresses to MAC addresses.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
255.255.255.0
11. 3 terms that define the forms of help available within the Cisco IOS
A. DNS b. SMTP c. POP
A. hot keys b. context-sensitive c. command syntax check
Network Media Control
Network
12. What is the purpose of the preamble in an ethernet frame?
As the commands are entered.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Transport
13. What makes fiber preferable to copper for interconnecting buildings?
DNS
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. larger address space b. data types and classes of service c. authentication and encryption
A. MTA b. SMTP
14. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
A. next-hop b. metric/interface c. destination network address
Host mobility
Show Interfaces
172.16.192.160
15. What device can check for faults - integrity and performance of media?
A. perform degradation b. security issues c. host identification
Originate data flow.
OTDR
Host A
16. At which layer of the TCP/IP model does ethernet operate?
A. netstat -r b. route PRINT
The physical address is added.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Network Access
17. How does the application layer on a server process multiple client requests for services?
It uses support from the lower layers to distinguish between connections to the service.
8
Source and Destination IP address
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
18. Which portion of the network layer address does a router use to forward packets?
A default gateway (router).
A. DNS b. SMTP c. POP
172.16.192.160
Network portion
19. What is the purpose of a default gateway?
UDP
Identify the device that allows local network computers to communicate w/ devices in other networks.
Console interface
A. copper UTP b. optical fiber
20. What are 2 commands used to view a host routing table?
A. netstat -r b. route PRINT
255.255.255.0
It uses lasers as the light source.
DNS
21. What is the primary purpose of ARP?
Resolve IPv4 addresses to MAC addresses.
RJ-45
Network Layer Packet
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
22. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Destination Network Address
Originate data flow.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Physical
23. Which combination of keys can be used to interrupt a ping or traceroute process?
Originate data flow.
Ctrl + Shift + 6
A. low overhead b. connectionless
Is used by the server to resolve names.
24. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
It does not support encryption.
A. servers b. routers c. network printers
80 (HTTP)
Physical
25. What are 2 forms of application layer software?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Originate data flow.
A. application b. services
The address of the router that the host will use to 'get to the other side'.
26. What networking devices are recommended to be assigned static IP addresses?
A. servers b. routers c. network printers
RJ-45
A. low overhead b. connectionless
Destination Network Address
27. What event occurs during the 3-way handshake?
IP is not properly installed
TCP initializes the sequence numbers for the sessions.
A. Physical b. Data Link
255.255.255.224
28. What method of signal transmission uses radio waves to carry signals?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Identify processes or services that are communicating with end devices.
Console
Wireless
29. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. enable mode b. priviledge executive mode
Destination is not contacted before a packet is sent.
Any device whose backoff timer expires first.
30. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
Application Layer
SMB
Physical
A. media sharing b. logical topology
31. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Binary ANDing
A physical topology.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
32. What type of network cable is used between a terminal and a console port?
To enable a receiving host to forward the data to the appropriate application.
Source Port
Identify processes or services that are communicating with end devices.
Rollover cable
33. What are 3 properties of contention-based media access for a shared media?
A. Cat5 UTP b. Cat6 UTP
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. non-deterministic b. less overhead c. collisions exist
Resolve IPv4 addresses to MAC addresses.
34. When a device is moved from one network to the other...?
32 bits
A. Cat5 UTP b. Cat6 UTP
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. goodput b. throughput c. bandwidth
35. What information is added during encapsulation at OSI Layer 3?
A. netstat -r b. route PRINT
Source and Destination IP address
No collisions will occur on this link.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
36. Important characteristic of UDP
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. decentralized resources b. resource sharing w/o a dedicated server
Minimal delays in data delivery.
The destination host address.
37. 2 characteristics of peer-2-peer
When connecting a host to a switch.
Console
A. decentralized resources b. resource sharing w/o a dedicated server
Host A
38. Group of hosts that have identical bit patterns in the high order bits of their addresses
32 bits
A. it has centralized administration b. security is easier to enforce
Next-Hop Address
Network
39. If the router says: 'Switch-East4#' What identifies the CLI mode represented?
Next-Hop Address
Any device whose backoff timer expires first.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. enable mode b. priviledge executive mode
40. 3 factors that should be considered when implementing Layer 2 protocols
Resolve IPv4 addresses to MAC addresses.
2046
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Console interface
41. What is the purpose of the TCP/IP Network Application Layer?
Network Media Control
Hosts return to listen-before-transmit mode.
A. application b. services
Console
42. Which characteristics describe fiber optic cable?
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. Cat5 UTP b. Cat6 UTP
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. not affected by EMI of RFI b. most expensive type of LAN cabling
43. After an ethernet collision - which device has priority to transmit data?
The destination host address.
No collisions will occur on this link.
Any device whose backoff timer expires first.
It provides for the exchange of data over a common local media.
44. 2 characteristics of clients in data networks
A. they initiate data exchanges b. they may upload data to servers
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
No collisions will occur on this link.
It does not support encryption.
45. When a network service fails - which port is most often used to access a router for management purposes?
The address of the router that the host will use to 'get to the other side'.
Console
Source Port
It uses lasers as the light source.
46. What is PDU?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Is a layer of specific encapsulation.
Supports error detection.
47. 3 functions of the upper data link sublayer in the OSI model
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Any device whose backoff timer expires first.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
48. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
DNS
Network Layer Packet
Transport
Host A
49. What are 2 email components used to forward mail between servers?
A. MTA b. SMTP
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Collisions can decrease network performance.
Rollover cable
50. 3 characteristics of valid Ethernet Layer 2 addresses
DNS
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A default gateway (router).