SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 3 terms that define the forms of help available within the Cisco IOS
A. hot keys b. context-sensitive c. command syntax check
A. DNS b. SMTP c. POP
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. it has centralized administration b. security is easier to enforce
2. statements of IP adressing
0 to 1023
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Fiber
3. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
The MAC protocol can be very simple.
Switch
The destination host address.
It uses support from the lower layers to distinguish between connections to the service.
4. Where is the IOS file stored at?
Flash
Network
Host mobility
Network Layer
5. When destination network is not in the routing table - What are 2 actions the router might take?
It has expanded adressing capabilities.
DNS
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Static
6. Statements that describe LAN
The packets will be delivered and reassembled at destination.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Source Port
As the commands are entered.
7. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
Minimal delays in data delivery.
A. hot keys b. context-sensitive c. command syntax check
0 to 1023
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
8. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. larger address space b. data types and classes of service c. authentication and encryption
Is used by the server to resolve names.
255.255.255.0
9. To make a console connection from a comp to a Cisco router - what cable should be used?
IP Protocol
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Rollover cable
A. flow control b. session establishment c. numbering and sequencing
10. What method of signal transmission uses radio waves to carry signals?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Minimal delays in data delivery.
Router(config)# interface FastEthernet 0/1
Wireless
11. What describes the purpose of default route?
Network Layer
80 (HTTP)
Rollover cable
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
12. What do the intermediary devices in the network do?
Show Interfaces
IP Protocol
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Is used by the server to resolve names.
13. What statements describe the logical token-passing topology?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. MTA b. SMTP
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Application Layer
14. What is the primary purpose of Layer 4?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Identify processes or services that are communicating with end devices.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Wireless
15. What characteristic of an UTP helps reduce interference?
Twisting of the cables
8
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. application b. services
16. What is dinamically selected by the source host when forwarding data?
Source Port
A. perform degradation b. security issues c. host identification
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. netstat -r b. route PRINT
17. What command is used to change the default name to 'Costas'?
Collisions can decrease network performance.
A. next-hop b. metric/interface c. destination network address
Router(config)# hostname Costas
DNS
18. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
A. HTTP b. HTTPS
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Router(config)# interface FastEthernet 0/1
19. What information is added during encapsulation at OSI Layer 3?
A. router b. firewall
Source and Destination IP address
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
20. 2 characteristics of peer-2-peer
A. decentralized resources b. resource sharing w/o a dedicated server
Twisting of the cables
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
21. What is the primary reason for developing IPv6?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
It has expanded adressing capabilities.
A. Physical b. Data Link
Hub
22. After an ethernet collision - which device has priority to transmit data?
Any device whose backoff timer expires first.
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
They must wait until the first hosts finish transfering the media.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
23. What are 2 email components used to forward mail between servers?
It provides interface between applications on either end of the network.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
255.255.255.224
A. MTA b. SMTP
24. What info is found in the TCP and UDP header info?
A. perform degradation b. security issues c. host identification
A. enable mode b. priviledge executive mode
Source and Destination Ports
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
25. What can get you to an outside network?
Router(config)# hostname Costas
A random delay helps prevent the stations from experiencing another collision during transmission.
A default gateway (router).
It reduces unnecessary broadcasts.
26. What is the primary function of encapsulating packets into frames?
A. addressing b. error detection c. frame delimiting
To facilitate the entry and exit of data on media.
It uses lasers as the light source.
Transport
27. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. they initiate data exchanges b. they may upload data to servers
A. the router will discard the packet b. the router will send a time exceeded message to the source host
The physical address is added.
Source and Destination IP address
28. What type of network cable is used between a terminal and a console port?
8
Network Layer Packet
A random delay helps prevent the stations from experiencing another collision during transmission.
Rollover cable
29. Why is flow control used for TCP data transfer?
Application Layer
A physical topology.
To prevent the receiver from being overwhelmed by incoming data.
A. replace a switch w/ a router b. subnet the new networks
30. What are 2 commands used to view a host routing table?
A. netstat -r b. route PRINT
A. DNS b. SMTP c. POP
SMB
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
31. During a TCP session - if packets arrive out of order - what will happen?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Is a layer of specific encapsulation.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
The packets will be delivered and reassembled at destination.
32. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Console interface
A. purpose b. geographic location c. ownership
Network Layer Packet
33. What is a disadvantage of Telnet?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. Cat5 UTP b. Cat6 UTP
It does not support encryption.
A physical topology.
34. If the router says: 'Switch-East4#' What identifies the CLI mode represented?
A. perform degradation b. security issues c. host identification
A. enable mode b. priviledge executive mode
Is used by the server to resolve names.
Source Port
35. What is the purpose of a default gateway?
SMB
Identify the device that allows local network computers to communicate w/ devices in other networks.
To prevent the receiver from being overwhelmed by incoming data.
When connecting a host to a switch.
36. What is a protocol that provides connectionless network layer services?
IP Protocol
Ctrl + Shift + 6
Supports error detection.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
37. 3 common problems w/ a large network
DNS
Logical Link Control sublayer
Fiber
A. performance degradation b. security issues c. host identification
38. Which IP packet field will prevent endless loops?
To enable a receiving host to forward the data to the appropriate application.
A. performance degradation b. security issues c. host identification
Time-to-live (TTL)
SSH
39. During encapsulation - what happens in the Data Link Layer?
255.255.255.0
Minimal delays in data delivery.
The physical address is added.
When connecting a host to a switch.
40. There are too many broadcasts on switches - what can be done?
Static
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. replace a switch w/ a router b. subnet the new networks
Application Layer
41. Which device is used to create or divide broadcast domains?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
UDP
Router
Collisions can decrease network performance.
42. If you have a small network w/ 3 computers...
A. goodput b. throughput c. bandwidth
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
They must wait until the first hosts finish transfering the media.
A. physical layer b. DLL layer
43. What is the purpose of the TCP/IP Network Application Layer?
Network Media Control
A. it has centralized administration b. security is easier to enforce
Network portion
80 (HTTP)
44. What correctly describes a MAC address?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Is a layer of specific encapsulation.
It uses lasers as the light source.
Host A
45. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
A default gateway (router).
Physical
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
MAC
46. In a connectionless system - What is correct?
No collisions will occur on this link.
Identify processes or services that are communicating with end devices.
A. router b. firewall
Destination is not contacted before a packet is sent.
47. What are 2 protocols for transfering web resources?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. HTTP b. HTTPS
A. performance degradation b. security issues c. host identification
Router
48. Which portion of the network layer address does a router use to forward packets?
Router(config)# interface FastEthernet 0/1
Network portion
Identify processes or services that are communicating with end devices.
The MAC protocol can be very simple.
49. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
255.255.255.224
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Switch
50. In business LANs - which connector is used w/ twisted-pair networking cable?
Physical
As the commands are entered.
Source and Destination Ports
RJ-45