SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 2 most commonly used media types in ethernet networks
A. performance degradation b. security issues c. host identification
A. copper UTP b. optical fiber
Minimal delays in data delivery.
UDP
2. What are 3 pieces of info about a route contained in a routing table?
Resolve IPv4 addresses to MAC addresses.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. next-hop b. metric/interface c. destination network address
3. 3 common problems w/ a large network
Network
A. performance degradation b. security issues c. host identification
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
The magnetic field around the adjacent pairs of wire.
4. What 2 type of cables would most commonly be used for new runs?
Network Layer Packet
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Is used by the server to resolve names.
A. Cat5 UTP b. Cat6 UTP
5. What is an effect of improperly applying a network cable connector?
Collisions can decrease network performance.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Supports error detection.
Signal loss can be experienced.
6. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
MAC
DNS
IP Protocol
Create signals that represent the bits in each frame for the media.
7. What do the intermediary devices in the network do?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
It uses support from the lower layers to distinguish between connections to the service.
Console
8. If you have a small network w/ 3 computers...
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. decentralized resources b. resource sharing w/o a dedicated server
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
To enable a receiving host to forward the data to the appropriate application.
9. 3 primary functions of the data link layer encapsulation
It does not support encryption.
UTP
RJ-45
A. addressing b. error detection c. frame delimiting
10. Default Gateway is incorrect on the host - What is the impact on the communications?
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Next-Hop Address
Signal loss can be experienced.
Source and Destination Ports
11. Intermediary devices used to implement security between networks
Identify processes or services that are communicating with end devices.
A. router b. firewall
Hub
A. larger address space b. data types and classes of service c. authentication and encryption
12. In a connectionless system - What is correct?
Identify processes or services that are communicating with end devices.
Switch
Destination is not contacted before a packet is sent.
A backbone cable.
13. Group of hosts that have identical bit patterns in the high order bits of their addresses
When connecting a host to a switch.
Console interface
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Network
14. What is the function of the DLL?
Time-to-live (TTL)
It provides for the exchange of data over a common local media.
Network Media Control
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
15. What is PDU?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Is a layer of specific encapsulation.
FTP
16. An admin needs to keep contents private - which access method should he use?
The physical address is added.
SSH
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
17. What layer encapsulates segments into packets?
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A. purpose b. geographic location c. ownership
Network Layer
A. hot keys b. context-sensitive c. command syntax check
18. Which layer supplies services and allows user interface?
It uses support from the lower layers to distinguish between connections to the service.
Application Layer
A. performance degradation b. security issues c. host identification
A. replace a switch w/ a router b. subnet the new networks
19. 3 functions of the upper data link sublayer in the OSI model
Network Media Control
Destination Network Address
Router(config)# interface FastEthernet 0/1
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
20. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
Router(config)# interface FastEthernet 0/1
UTP
Binary ANDing
The destination host address.
21. Which device is used to create or divide broadcast domains?
Transport
A. media sharing b. logical topology
Collisions can decrease network performance.
Router
22. What is a component of a routing table entry?
Identify processes or services that are communicating with end devices.
Next-Hop Address
When connecting a host to a switch.
As the commands are entered.
23. Which 2 options represent Layer 4 addressing?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Fiber
The magnetic field around the adjacent pairs of wire.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
24. 3 terms that define the forms of help available within the Cisco IOS
Application Layer
SSH
MAC
A. hot keys b. context-sensitive c. command syntax check
25. What statements describe the logical token-passing topology?
Window Size
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Next-Hop Address
26. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Network address
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Physical
A. servers b. routers c. network printers
27. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
Router(config)# interface FastEthernet 0/1
Source and Destination IP address
A. enable mode b. priviledge executive mode
Rollover cable
28. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. the router will discard the packet b. the router will send a time exceeded message to the source host
To enable a receiving host to forward the data to the appropriate application.
IP is not properly installed
0 to 1023
29. 3 measures of data transfer
A. goodput b. throughput c. bandwidth
Is used by the server to resolve names.
A. purpose b. geographic location c. ownership
It uses lasers as the light source.
30. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Window Size
SMB
31. What can you identify when you examine the Network Layer header?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
The destination host address.
It does not support encryption.
0 to 1023
32. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
A. they initiate data exchanges b. they may upload data to servers
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
0 to 1023
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
33. 3 statements about the role of routers in the network
Supports error detection.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. physical layer b. DLL layer
34. What are the advantages of using a client-server model?
172.16.192.160
To prevent the receiver from being overwhelmed by incoming data.
A. it has centralized administration b. security is easier to enforce
TCP initializes the sequence numbers for the sessions.
35. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Logical Link Control sublayer
No collisions will occur on this link.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
80 (HTTP)
36. What are 2 common characteristics associated w/ dynamic routing protocols?
Network Media Control
A. Cat5 UTP b. Cat6 UTP
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Resolve IPv4 addresses to MAC addresses.
37. Why are port numbers included in the TCP header of a segment?
Network Layer Packet
To enable a receiving host to forward the data to the appropriate application.
Network portion
Is used by the server to resolve names.
38. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
80 (HTTP)
A. application b. services
255.255.255.224
172.16.192.160
39. What command is used to change the default name to 'Costas'?
It has expanded adressing capabilities.
DNS
Network
Router(config)# hostname Costas
40. During a TCP session - if packets arrive out of order - what will happen?
Rollover cable
Application Layer
The packets will be delivered and reassembled at destination.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
41. statements of IP adressing
A. they initiate data exchanges b. they may upload data to servers
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Hub
DNS
42. What is a characteristic of a single-mode fiber-optic cable?
To prevent the receiver from being overwhelmed by incoming data.
It uses lasers as the light source.
The magnetic field around the adjacent pairs of wire.
Network Layer Packet
43. What is the purpose of the preamble in an ethernet frame?
A. decentralized resources b. resource sharing w/o a dedicated server
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Source Port
A. hot keys b. context-sensitive c. command syntax check
44. How does the application layer on a server process multiple client requests for services?
OTDR
MAC
A. larger address space b. data types and classes of service c. authentication and encryption
It uses support from the lower layers to distinguish between connections to the service.
45. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
TCP initializes the sequence numbers for the sessions.
The packets will be delivered and reassembled at destination.
Switch
A. show startup-config b. show running-config
46. What is the purpose of resource records in DNS?
A. goodput b. throughput c. bandwidth
A. Physical b. Data Link
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Is used by the server to resolve names.
47. After an ethernet collision - which device has priority to transmit data?
8
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Any device whose backoff timer expires first.
Time-to-live (TTL)
48. What application layer protocol is used to support file transfers between client and server?
Source Port
Transport
RJ-45
FTP
49. Important characteristic of UDP
Minimal delays in data delivery.
Source and Destination Ports
A. goodput b. throughput c. bandwidth
A. low overhead b. connectionless
50. At which layers of the OSI model does ethernet operate?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. minimizing of collisions b. division into broadcast domains
A. physical layer b. DLL layer
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential