SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When destination network is not in the routing table - What are 2 actions the router might take?
A. replace a switch w/ a router b. subnet the new networks
They must wait until the first hosts finish transfering the media.
UDP
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
2. Which combination of keys can be used to interrupt a ping or traceroute process?
Destination is not contacted before a packet is sent.
Host A
Rollover cable
Ctrl + Shift + 6
3. What is a drawback of the CSMA/CD access method?
A. flow control b. session establishment c. numbering and sequencing
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Collisions can decrease network performance.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
4. What is a characteristic of a logical point-to-point topology?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
The MAC protocol can be very simple.
5. What are the advantages of using a client-server model?
A. it has centralized administration b. security is easier to enforce
A. show startup-config b. show running-config
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. addressing b. error detection c. frame delimiting
6. What do the intermediary devices in the network do?
Network Layer
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
7. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
A. media sharing b. logical topology
UDP
A. not affected by EMI of RFI b. most expensive type of LAN cabling
255.255.255.224
8. How many bits make up an IPv4 address?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
32 bits
A. MTA b. SMTP
A. larger address space b. data types and classes of service c. authentication and encryption
9. What describes the purpose of default route?
Resolve IPv4 addresses to MAC addresses.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Source and Destination IP address
10. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Router(config)# hostname Costas
A. copper UTP b. optical fiber
Transport
11. When do changes take effect in a Cisco router?
As the commands are entered.
Rollover cable
Any device whose backoff timer expires first.
Switch
12. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
Binary ANDing
A. minimizing of collisions b. division into broadcast domains
To enable a receiving host to forward the data to the appropriate application.
Create signals that represent the bits in each frame for the media.
13. What correctly describes a MAC address?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Transport
A. goodput b. throughput c. bandwidth
SMB
14. What is the proper order of the OSI Layers?
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. DNS b. SMTP c. POP
Source and Destination Ports
15. What connectors are commonly associated w/ Cisco's V.35 serial cables?
A. DB 60 b. Winchester 15-pin c. smart serial
Network Access
A. physical layer b. DLL layer
A. larger address space b. data types and classes of service c. authentication and encryption
16. What method of signal transmission uses radio waves to carry signals?
Window Size
Wireless
Hosts return to listen-before-transmit mode.
Minimal delays in data delivery.
17. Which device is used to create or divide broadcast domains?
DNS
Router
Create signals that represent the bits in each frame for the media.
FTP
18. What is an effect of improperly applying a network cable connector?
Flash
Signal loss can be experienced.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
19. 3 protocols that operate in the application layer
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. MTA b. SMTP
A. DNS b. SMTP c. POP
OTDR
20. What info is found in the TCP and UDP header info?
Source and Destination Ports
A backbone cable.
A. flow control b. session establishment c. numbering and sequencing
A. netstat -r b. route PRINT
21. What is the primary purpose of Layer 4?
255.255.255.224
Identify processes or services that are communicating with end devices.
Network Layer
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
22. After an ethernet collision - which device has priority to transmit data?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
It uses lasers as the light source.
Any device whose backoff timer expires first.
A. it has centralized administration b. security is easier to enforce
23. What can get you to an outside network?
0 to 1023
A. hot keys b. context-sensitive c. command syntax check
Identify the device that allows local network computers to communicate w/ devices in other networks.
A default gateway (router).
24. What is a benefit of a WAN?
Host mobility
A physical topology.
A. router b. firewall
Router(config)# interface FastEthernet 0/1
25. What is the purpose of the TCP/IP Network Application Layer?
Network Media Control
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
No collisions will occur on this link.
To facilitate the entry and exit of data on media.
26. 2 features that make switches preferable to hubs
A. purpose b. geographic location c. ownership
Hosts return to listen-before-transmit mode.
A. minimizing of collisions b. division into broadcast domains
A. it has centralized administration b. security is easier to enforce
27. What is the primary rope of the physical layer in transmitting data?
A. performance degradation b. security issues c. host identification
Create signals that represent the bits in each frame for the media.
Network Layer Packet
Is a layer of specific encapsulation.
28. What do end devices do?
Source and Destination Ports
Originate data flow.
UTP
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
29. What 2 type of cables would most commonly be used for new runs?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. Cat5 UTP b. Cat6 UTP
SSH
FTP
30. What are 3 properties of contention-based media access for a shared media?
A. they initiate data exchanges b. they may upload data to servers
It does not support encryption.
Supports error detection.
A. non-deterministic b. less overhead c. collisions exist
31. Which layer supplies services and allows user interface?
Application Layer
172.16.192.160
It reduces unnecessary broadcasts.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
32. What are 3 pieces of info about a route contained in a routing table?
A. next-hop b. metric/interface c. destination network address
A. decentralized resources b. resource sharing w/o a dedicated server
Source Port
2046
33. What is the primary function of encapsulating packets into frames?
172.16.192.160
To facilitate the entry and exit of data on media.
A. it has centralized administration b. security is easier to enforce
A physical topology.
34. What networking devices are recommended to be assigned static IP addresses?
A. servers b. routers c. network printers
A. application b. services
Identify the device that allows local network computers to communicate w/ devices in other networks.
Host mobility
35. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
A backbone cable.
A. servers b. routers c. network printers
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Switch
36. Important characteristic of UDP
Is a layer of specific encapsulation.
A. decentralized resources b. resource sharing w/o a dedicated server
Minimal delays in data delivery.
Network address
37. What do you need to use for an initial configuration on a Cisco router?
A. servers b. routers c. network printers
Application Layer
Router
Console interface
38. In business LANs - which connector is used w/ twisted-pair networking cable?
RJ-45
The physical address is added.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
It uses support from the lower layers to distinguish between connections to the service.
39. Which type of cable is most often associated w/ fiber-optic cable?
Rollover cable
Transport
Any device whose backoff timer expires first.
A backbone cable.
40. During a TCP session - if packets arrive out of order - what will happen?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. enable mode b. priviledge executive mode
FTP
The packets will be delivered and reassembled at destination.
41. What is the role of the OSI Application Layer?
It provides interface between applications on either end of the network.
A. purpose b. geographic location c. ownership
The address of the router that the host will use to 'get to the other side'.
172.16.192.160
42. What is the primary reason for developing IPv6?
Next-Hop Address
A. identifies the communicating applications b. identifies multiple conversations between the hosts
SSH
It has expanded adressing capabilities.
43. What is a disadvantage of Telnet?
Network
It does not support encryption.
They must wait until the first hosts finish transfering the media.
As the commands are entered.
44. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
A backbone cable.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Network address
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
45. What type of network cable is used between a terminal and a console port?
Rollover cable
Fiber
It uses support from the lower layers to distinguish between connections to the service.
A. HTTP b. HTTPS
46. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
80 (HTTP)
Twisting of the cables
IP Protocol
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
47. What are 2 common characteristics associated w/ dynamic routing protocols?
MAC
A physical topology.
No collisions will occur on this link.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
48. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
Source and Destination IP address
Window Size
A. purpose b. geographic location c. ownership
Network Layer
49. statements of IP adressing
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
OTDR
Destination Network Address
A. next-hop b. metric/interface c. destination network address
50. 3 statements of media acess control
A. servers b. routers c. network printers
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. flow control b. session establishment c. numbering and sequencing
A physical topology.