SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What do you need to use for an initial configuration on a Cisco router?
Next-Hop Address
Console interface
The destination host address.
Fiber
2. 3 features of IPv6
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. larger address space b. data types and classes of service c. authentication and encryption
Router
A. application b. presentation c. session d. transmision e. network f. data link g. physical
3. Why is flow control used for TCP data transfer?
A. the router will discard the packet b. the router will send a time exceeded message to the source host
To prevent the receiver from being overwhelmed by incoming data.
A default gateway (router).
A backbone cable.
4. When a device is moved from one network to the other...?
It provides interface between applications on either end of the network.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. hot keys b. context-sensitive c. command syntax check
The address of the router that the host will use to 'get to the other side'.
5. If you have a small network w/ 3 computers...
A. MTA b. SMTP
A. Physical b. Data Link
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
6. What can you identify when you examine the Network Layer header?
A. low overhead b. connectionless
OTDR
They must wait until the first hosts finish transfering the media.
The destination host address.
7. Default Gateway is incorrect on the host - What is the impact on the communications?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Console interface
Network portion
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
8. 2 most commonly used media types in ethernet networks
A. copper UTP b. optical fiber
A. low overhead b. connectionless
A. netstat -r b. route PRINT
A. not affected by EMI of RFI b. most expensive type of LAN cabling
9. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
Ctrl + Shift + 6
Network Media Control
UDP
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
10. What are key considering factors when grouping hosts into common networks?
A. larger address space b. data types and classes of service c. authentication and encryption
Application Layer
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. purpose b. geographic location c. ownership
11. What is a component of a routing table entry?
Network Layer
Destination Network Address
A. HTTP b. HTTPS
Next-Hop Address
12. When do changes take effect in a Cisco router?
As the commands are entered.
Static
8
A. goodput b. throughput c. bandwidth
13. What is a protocol that provides connectionless network layer services?
255.255.255.0
IP Protocol
Router(config)# hostname Costas
Rollover cable
14. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. it has centralized administration b. security is easier to enforce
255.255.255.224
It uses support from the lower layers to distinguish between connections to the service.
15. What device can check for faults - integrity and performance of media?
Application Layer
The MAC protocol can be very simple.
OTDR
To enable a receiving host to forward the data to the appropriate application.
16. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
2046
A. media sharing b. logical topology
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
RJ-45
17. Where is the IOS file stored at?
Flash
32 bits
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Next-Hop Address
18. Which combination of keys can be used to interrupt a ping or traceroute process?
Ctrl + Shift + 6
A. copper UTP b. optical fiber
DNS
A. they initiate data exchanges b. they may upload data to servers
19. What makes fiber preferable to copper for interconnecting buildings?
IP is not properly installed
Next-Hop Address
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Switch
20. What are 3 common problems w/ large networks?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. perform degradation b. security issues c. host identification
A. goodput b. throughput c. bandwidth
SSH
21. What causes crosstalk within cable pairs when using UTP?
The magnetic field around the adjacent pairs of wire.
The MAC protocol can be very simple.
Source and Destination IP address
A. router b. firewall
22. What application layer protocol is used to support file transfers between client and server?
They must wait until the first hosts finish transfering the media.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
FTP
A. goodput b. throughput c. bandwidth
23. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. the router will discard the packet b. the router will send a time exceeded message to the source host
MAC
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Fiber
24. An admin needs to keep contents private - which access method should he use?
A. non-deterministic b. less overhead c. collisions exist
80 (HTTP)
SSH
A. copper UTP b. optical fiber
25. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A default gateway (router).
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
They must wait until the first hosts finish transfering the media.
26. Which type of cable is most often associated w/ fiber-optic cable?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A backbone cable.
Window Size
27. What command can be used to determine if the router has experienced any input or output errors?
When connecting a host to a switch.
Router
Show Interfaces
UTP
28. Intermediary devices used to implement security between networks
It provides interface between applications on either end of the network.
Transport
A. router b. firewall
Next-Hop Address
29. What is the primary purpose of Layer 4?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. purpose b. geographic location c. ownership
Identify processes or services that are communicating with end devices.
Destination Network Address
30. What are 2 commands used to view a host routing table?
A. netstat -r b. route PRINT
A. DNS b. SMTP c. POP
Physical
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
31. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
255.255.255.0
Window Size
A. copper UTP b. optical fiber
A. identifies the communicating applications b. identifies multiple conversations between the hosts
32. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
It provides for the exchange of data over a common local media.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Console interface
Ctrl + Shift + 6
33. What is the function of the DLL?
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
2046
RJ-45
It provides for the exchange of data over a common local media.
34. What are 2 forms of application layer software?
A. perform degradation b. security issues c. host identification
Hub
A. application b. services
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
35. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
Hub
Router(config)# interface FastEthernet 0/1
Binary ANDing
To enable a receiving host to forward the data to the appropriate application.
36. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
To facilitate the entry and exit of data on media.
A. larger address space b. data types and classes of service c. authentication and encryption
Router(config)# interface FastEthernet 0/1
It reduces unnecessary broadcasts.
37. What information is added during encapsulation at OSI Layer 3?
Fiber
A. they initiate data exchanges b. they may upload data to servers
Source and Destination IP address
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
38. What is the purpose of resource records in DNS?
RJ-45
Application Layer
A. goodput b. throughput c. bandwidth
Is used by the server to resolve names.
39. What is the role of the OSI Application Layer?
It provides interface between applications on either end of the network.
The magnetic field around the adjacent pairs of wire.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Resolve IPv4 addresses to MAC addresses.
40. What is a benefit of a WAN?
Host mobility
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. non-deterministic b. less overhead c. collisions exist
A. router b. firewall
41. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
Originate data flow.
Network Layer Packet
255.255.255.0
Fiber
42. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
A. DNS b. SMTP c. POP
A random delay helps prevent the stations from experiencing another collision during transmission.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
80 (HTTP)
43. Why are port numbers included in the TCP header of a segment?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
To enable a receiving host to forward the data to the appropriate application.
The magnetic field around the adjacent pairs of wire.
A. enable mode b. priviledge executive mode
44. In a connectionless system - What is correct?
0 to 1023
Window Size
A. router b. firewall
Destination is not contacted before a packet is sent.
45. What statements describe the logical token-passing topology?
Application Layer
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
When connecting a host to a switch.
A. Physical b. Data Link
46. What determines the method of media access control?
A. media sharing b. logical topology
It uses support from the lower layers to distinguish between connections to the service.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
The MAC protocol can be very simple.
47. What is a characteristic of a logical point-to-point topology?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
The MAC protocol can be very simple.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Static
48. During encapsulation - what happens in the Data Link Layer?
The physical address is added.
Static
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
RJ-45
49. What is the primary purpose of ARP?
A. non-deterministic b. less overhead c. collisions exist
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Resolve IPv4 addresses to MAC addresses.
A. Cat5 UTP b. Cat6 UTP
50. What describes the purpose of default route?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Console
Any device whose backoff timer expires first.
It does not support encryption.