SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 3 characteristics of valid Ethernet Layer 2 addresses
It has expanded adressing capabilities.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Static
2. What is the role of MTA in handling email?
Show Interfaces
A. the router will discard the packet b. the router will send a time exceeded message to the source host
As the commands are entered.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
3. After an ethernet collision - which device has priority to transmit data?
It uses lasers as the light source.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Any device whose backoff timer expires first.
Switch
4. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
80 (HTTP)
A. low overhead b. connectionless
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. perform degradation b. security issues c. host identification
5. What command can be used to determine if the router has experienced any input or output errors?
A backbone cable.
Switch
A. copper UTP b. optical fiber
Show Interfaces
6. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
32 bits
Binary ANDing
Hosts return to listen-before-transmit mode.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
7. What is the primary purpose of Layer 4?
To enable a receiving host to forward the data to the appropriate application.
Identify processes or services that are communicating with end devices.
Network Access
As the commands are entered.
8. Which characteristics describe fiber optic cable?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Originate data flow.
Static
9. What is dinamically selected by the source host when forwarding data?
A. physical layer b. DLL layer
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
8
Source Port
10. What is the primary reason for developing IPv6?
Collisions can decrease network performance.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
It has expanded adressing capabilities.
A. goodput b. throughput c. bandwidth
11. What is a default gateway address?
12. What type of network cable is used between a terminal and a console port?
Rollover cable
Ctrl + Shift + 6
Source and Destination Ports
Host mobility
13. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
Identify processes or services that are communicating with end devices.
MAC
A. next-hop b. metric/interface c. destination network address
Network Access
14. What are 3 properties of contention-based media access for a shared media?
A. non-deterministic b. less overhead c. collisions exist
Network Layer Packet
It uses support from the lower layers to distinguish between connections to the service.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
15. If you have a small network w/ 3 computers...
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Console interface
16. What info is found in the TCP and UDP header info?
IP Protocol
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Destination Network Address
Source and Destination Ports
17. What does the IEEE 802.2 standard represent in Ethernet technologies?
Logical Link Control sublayer
80 (HTTP)
The physical address is added.
It has expanded adressing capabilities.
18. What layer encapsulates segments into packets?
Network Layer
It uses lasers as the light source.
A. addressing b. error detection c. frame delimiting
Application Layer
19. Where is the IOS file stored at?
Binary ANDing
MAC
Flash
A. servers b. routers c. network printers
20. What is a component of a routing table entry?
Host mobility
Next-Hop Address
Switch
Logical Link Control sublayer
21. What do end devices do?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Originate data flow.
Hub
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
22. What statements describe the logical token-passing topology?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
The MAC protocol can be very simple.
0 to 1023
Source Port
23. What is a protocol that provides connectionless network layer services?
Signal loss can be experienced.
A. MTA b. SMTP
IP Protocol
A. DB 60 b. Winchester 15-pin c. smart serial
24. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
To facilitate the entry and exit of data on media.
Network Layer Packet
Network Access
Collisions can decrease network performance.
25. What are 2 features of User Diagram Protocol (UDP)?
A. low overhead b. connectionless
Static
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Fiber
26. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
UTP
A. hot keys b. context-sensitive c. command syntax check
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Host mobility
27. What is the proper order of the OSI Layers?
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Router
2046
A. Cat5 UTP b. Cat6 UTP
28. Intermediary devices used to implement security between networks
A. router b. firewall
Network Access
A. decentralized resources b. resource sharing w/o a dedicated server
A. MTA b. SMTP
29. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
DNS
Host A
30. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
A. Physical b. Data Link
To facilitate the entry and exit of data on media.
Any device whose backoff timer expires first.
Host A
31. 2 most commonly used media types in ethernet networks
A. hot keys b. context-sensitive c. command syntax check
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. copper UTP b. optical fiber
Window Size
32. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
Hub
Network Access
A. application b. services
FTP
33. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
Router(config)# interface FastEthernet 0/1
A. it has centralized administration b. security is easier to enforce
MAC
Window Size
34. What is the primary purpose of ARP?
Static
A. addressing b. error detection c. frame delimiting
To prevent the receiver from being overwhelmed by incoming data.
Resolve IPv4 addresses to MAC addresses.
35. When a network service fails - which port is most often used to access a router for management purposes?
Switch
A. Cat5 UTP b. Cat6 UTP
Identify processes or services that are communicating with end devices.
Console
36. 3 statements about routes and their use
Destination is not contacted before a packet is sent.
A. DB 60 b. Winchester 15-pin c. smart serial
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Host A
37. What command is used to change the default name to 'Costas'?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
When connecting a host to a switch.
Rollover cable
Router(config)# hostname Costas
38. When is a straight-through cable used in a network?
When connecting a host to a switch.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
172.16.192.160
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
39. 2 characteristics of peer-2-peer
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. decentralized resources b. resource sharing w/o a dedicated server
A. performance degradation b. security issues c. host identification
40. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
A. they initiate data exchanges b. they may upload data to servers
It uses lasers as the light source.
UDP
A. DB 60 b. Winchester 15-pin c. smart serial
41. 3 measures of data transfer
When connecting a host to a switch.
A. goodput b. throughput c. bandwidth
A backbone cable.
OTDR
42. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
Hub
Is used by the server to resolve names.
255.255.255.0
A. the router will discard the packet b. the router will send a time exceeded message to the source host
43. What is an automated service that matches resource names w/ required IP addresses?
DNS
Create signals that represent the bits in each frame for the media.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
44. What describes the purpose of default route?
8
A. non-deterministic b. less overhead c. collisions exist
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Router
45. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Destination Network Address
A. decentralized resources b. resource sharing w/o a dedicated server
A. perform degradation b. security issues c. host identification
It provides interface between applications on either end of the network.
46. What is a drawback of the CSMA/CD access method?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Collisions can decrease network performance.
A random delay helps prevent the stations from experiencing another collision during transmission.
IP is not properly installed
47. Which layer supplies services and allows user interface?
A. goodput b. throughput c. bandwidth
Network address
FTP
Application Layer
48. What are the advantages of using a client-server model?
A. it has centralized administration b. security is easier to enforce
A. DNS b. SMTP c. POP
A random delay helps prevent the stations from experiencing another collision during transmission.
The destination host address.
49. What are 2 forms of application layer software?
A. application b. services
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Twisting of the cables
A. addressing b. error detection c. frame delimiting
50. When a device is moved from one network to the other...?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. HTTP b. HTTPS
Static
DNS