SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 3 factors that should be considered when implementing Layer 2 protocols
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
2. What is the primary purpose of Layer 4?
Router(config)# interface FastEthernet 0/1
Identify processes or services that are communicating with end devices.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
OTDR
3. 3 common problems w/ a large network
DNS
It provides for the exchange of data over a common local media.
Ctrl + Shift + 6
A. performance degradation b. security issues c. host identification
4. What information is added during encapsulation at OSI Layer 3?
They must wait until the first hosts finish transfering the media.
IP Protocol
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Source and Destination IP address
5. What is the function of the DLL?
A. router b. firewall
A. hot keys b. context-sensitive c. command syntax check
Network Media Control
It provides for the exchange of data over a common local media.
6. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
Fiber
A. DNS b. SMTP c. POP
Switch
IP Protocol
7. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Hosts return to listen-before-transmit mode.
80 (HTTP)
IP Protocol
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
8. What is the purpose of the preamble in an ethernet frame?
A random delay helps prevent the stations from experiencing another collision during transmission.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Router
9. When a device is moved from one network to the other...?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A physical topology.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Is a layer of specific encapsulation.
10. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
Wireless
A. HTTP b. HTTPS
32 bits
255.255.255.0
11. During a TCP session - if packets arrive out of order - what will happen?
The packets will be delivered and reassembled at destination.
A. physical layer b. DLL layer
Source Port
Transport
12. What are key considering factors when grouping hosts into common networks?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Hosts return to listen-before-transmit mode.
A. purpose b. geographic location c. ownership
A. Physical b. Data Link
13. What can get you to an outside network?
A default gateway (router).
Logical Link Control sublayer
A random delay helps prevent the stations from experiencing another collision during transmission.
80 (HTTP)
14. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
0 to 1023
Switch
A. Physical b. Data Link
UTP
15. statements of IP adressing
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Rollover cable
It uses support from the lower layers to distinguish between connections to the service.
Hub
16. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Network
255.255.255.224
17. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
Host A
RJ-45
32 bits
A. show startup-config b. show running-config
18. If you have a full-duplex operational network - what can happen?
The magnetic field around the adjacent pairs of wire.
Network
A. Cat5 UTP b. Cat6 UTP
No collisions will occur on this link.
19. What are 2 forms of application layer software?
The MAC protocol can be very simple.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
It reduces unnecessary broadcasts.
A. application b. services
20. What is an effect of improperly applying a network cable connector?
Signal loss can be experienced.
Router(config)# interface FastEthernet 0/1
A. application b. services
The packets will be delivered and reassembled at destination.
21. If you have a small network w/ 3 computers...
Console
Logical Link Control sublayer
Network Layer Packet
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
22. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
Host A
To facilitate the entry and exit of data on media.
2046
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
23. Important characteristic of UDP
Minimal delays in data delivery.
Wireless
TCP initializes the sequence numbers for the sessions.
A. servers b. routers c. network printers
24. What networking devices are recommended to be assigned static IP addresses?
0 to 1023
A. servers b. routers c. network printers
When connecting a host to a switch.
The address of the router that the host will use to 'get to the other side'.
25. What command is used to change the default name to 'Costas'?
It provides for the exchange of data over a common local media.
Router(config)# hostname Costas
A random delay helps prevent the stations from experiencing another collision during transmission.
255.255.255.0
26. How many bits make up an IPv4 address?
Network Media Control
32 bits
A. media sharing b. logical topology
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
27. What is PDU?
A default gateway (router).
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Is a layer of specific encapsulation.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
28. What can be a problem that is reduced by adding end-to-end addressing?
Network Layer
IP Protocol
Application Layer
It reduces unnecessary broadcasts.
29. Intermediary devices used to implement security between networks
Originate data flow.
It uses lasers as the light source.
A. router b. firewall
A. addressing b. error detection c. frame delimiting
30. Default Gateway is incorrect on the host - What is the impact on the communications?
To prevent the receiver from being overwhelmed by incoming data.
Ctrl + Shift + 6
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Window Size
31. What is the primary purpose of ARP?
Resolve IPv4 addresses to MAC addresses.
Wireless
A random delay helps prevent the stations from experiencing another collision during transmission.
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
32. 2 characteristics of peer-2-peer
Transport
It reduces unnecessary broadcasts.
A. decentralized resources b. resource sharing w/o a dedicated server
When connecting a host to a switch.
33. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
0 to 1023
To enable a receiving host to forward the data to the appropriate application.
A. goodput b. throughput c. bandwidth
A. purpose b. geographic location c. ownership
34. What is a characteristic of a single-mode fiber-optic cable?
A. next-hop b. metric/interface c. destination network address
It uses lasers as the light source.
The magnetic field around the adjacent pairs of wire.
Source and Destination IP address
35. 3 statements about the role of routers in the network
A. show startup-config b. show running-config
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. next-hop b. metric/interface c. destination network address
A. Cat5 UTP b. Cat6 UTP
36. What does the IEEE 802.2 standard represent in Ethernet technologies?
Physical
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Logical Link Control sublayer
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
37. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
UTP
A. DNS b. SMTP c. POP
A. the router will discard the packet b. the router will send a time exceeded message to the source host
MAC
38. What is a component of a routing table entry?
FTP
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Next-Hop Address
It provides interface between applications on either end of the network.
39. What 2 type of cables would most commonly be used for new runs?
Hosts return to listen-before-transmit mode.
Wireless
A. Cat5 UTP b. Cat6 UTP
Network Media Control
40. 2 features that make switches preferable to hubs
A. minimizing of collisions b. division into broadcast domains
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
41. At which layers of the OSI model does ethernet operate?
A. physical layer b. DLL layer
A. copper UTP b. optical fiber
32 bits
A. larger address space b. data types and classes of service c. authentication and encryption
42. 2 functions of encapsulation
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. decentralized resources b. resource sharing w/o a dedicated server
Logical Link Control sublayer
43. What is the role of MTA in handling email?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
2046
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. hot keys b. context-sensitive c. command syntax check
44. What are 2 features of User Diagram Protocol (UDP)?
A. low overhead b. connectionless
It provides interface between applications on either end of the network.
Hub
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
45. What is a protocol that provides connectionless network layer services?
IP Protocol
A. application b. services
The physical address is added.
A. flow control b. session establishment c. numbering and sequencing
46. 3 statements of media acess control
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. replace a switch w/ a router b. subnet the new networks
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Source and Destination IP address
47. What connectors are commonly associated w/ Cisco's V.35 serial cables?
Router(config)# interface FastEthernet 0/1
A. DB 60 b. Winchester 15-pin c. smart serial
RJ-45
SMB
48. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
It provides for the exchange of data over a common local media.
255.255.255.0
A. goodput b. throughput c. bandwidth
49. When destination network is not in the routing table - What are 2 actions the router might take?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
RJ-45
A. Physical b. Data Link
50. After an ethernet collision - which device has priority to transmit data?
Network
A. next-hop b. metric/interface c. destination network address
Any device whose backoff timer expires first.
To enable a receiving host to forward the data to the appropriate application.