SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 3 factors that should be considered when implementing Layer 2 protocols
80 (HTTP)
A. it has centralized administration b. security is easier to enforce
Any device whose backoff timer expires first.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
2. 3 measures of data transfer
A. non-deterministic b. less overhead c. collisions exist
A. hot keys b. context-sensitive c. command syntax check
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. goodput b. throughput c. bandwidth
3. What are 2 features of User Diagram Protocol (UDP)?
The packets will be delivered and reassembled at destination.
A random delay helps prevent the stations from experiencing another collision during transmission.
A. low overhead b. connectionless
A. physical layer b. DLL layer
4. An admin needs to keep contents private - which access method should he use?
SSH
IP Protocol
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Application Layer
5. What event occurs during the 3-way handshake?
Supports error detection.
TCP initializes the sequence numbers for the sessions.
Time-to-live (TTL)
A. servers b. routers c. network printers
6. 3 statements of media acess control
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Network address
Source and Destination IP address
Hub
7. What is the purpose of resource records in DNS?
UDP
It uses lasers as the light source.
32 bits
Is used by the server to resolve names.
8. During a TCP session - if packets arrive out of order - what will happen?
Router(config)# interface FastEthernet 0/1
The packets will be delivered and reassembled at destination.
A. Cat5 UTP b. Cat6 UTP
Collisions can decrease network performance.
9. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. Cat5 UTP b. Cat6 UTP
SMB
8
A. non-deterministic b. less overhead c. collisions exist
10. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
It uses lasers as the light source.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Originate data flow.
MAC
11. What is the primary function of encapsulating packets into frames?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. perform degradation b. security issues c. host identification
To facilitate the entry and exit of data on media.
Physical
12. What correctly describes a MAC address?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Window Size
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Network Media Control
13. What info is found in the TCP and UDP header info?
Network address
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Transport
Source and Destination Ports
14. What networking devices are recommended to be assigned static IP addresses?
Next-Hop Address
A. servers b. routers c. network printers
It provides for the exchange of data over a common local media.
No collisions will occur on this link.
15. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
Router(config)# interface FastEthernet 0/1
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A backbone cable.
A. application b. presentation c. session d. transmision e. network f. data link g. physical
16. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Is a layer of specific encapsulation.
Destination is not contacted before a packet is sent.
Network address
17. What are the advantages of using a client-server model?
A. it has centralized administration b. security is easier to enforce
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
0 to 1023
Console interface
18. What can you identify when you examine the Network Layer header?
A. minimizing of collisions b. division into broadcast domains
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
The destination host address.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
19. What is an effect of improperly applying a network cable connector?
It has expanded adressing capabilities.
Signal loss can be experienced.
Console interface
Switch
20. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
IP is not properly installed
MAC
Twisting of the cables
80 (HTTP)
21. What can be a problem that is reduced by adding end-to-end addressing?
A backbone cable.
It reduces unnecessary broadcasts.
A. they initiate data exchanges b. they may upload data to servers
Rollover cable
22. There are too many broadcasts on switches - what can be done?
Application Layer
A. replace a switch w/ a router b. subnet the new networks
The packets will be delivered and reassembled at destination.
Router
23. 2 characteristics of clients in data networks
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. non-deterministic b. less overhead c. collisions exist
A. they initiate data exchanges b. they may upload data to servers
The packets will be delivered and reassembled at destination.
24. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
UTP
It provides interface between applications on either end of the network.
A. netstat -r b. route PRINT
25. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
A. the router will discard the packet b. the router will send a time exceeded message to the source host
172.16.192.160
A. netstat -r b. route PRINT
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
26. What are key considering factors when grouping hosts into common networks?
To prevent the receiver from being overwhelmed by incoming data.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. purpose b. geographic location c. ownership
TCP initializes the sequence numbers for the sessions.
27. What causes crosstalk within cable pairs when using UTP?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
FTP
Ctrl + Shift + 6
The magnetic field around the adjacent pairs of wire.
28. What 2 type of cables would most commonly be used for new runs?
Binary ANDing
A. Cat5 UTP b. Cat6 UTP
No collisions will occur on this link.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
29. What is the purpose of the preamble in an ethernet frame?
The packets will be delivered and reassembled at destination.
Fiber
Collisions can decrease network performance.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
30. What characteristic of an UTP helps reduce interference?
A. HTTP b. HTTPS
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Twisting of the cables
Network
31. How does the application layer on a server process multiple client requests for services?
A. HTTP b. HTTPS
It uses support from the lower layers to distinguish between connections to the service.
A. Physical b. Data Link
Next-Hop Address
32. 3 protocols that operate in the application layer
Next-Hop Address
Network Media Control
A. DNS b. SMTP c. POP
A. identifies the communicating applications b. identifies multiple conversations between the hosts
33. What are 2 commands used to view a host routing table?
A. router b. firewall
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. netstat -r b. route PRINT
SMB
34. Default Gateway is incorrect on the host - What is the impact on the communications?
It provides for the exchange of data over a common local media.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Destination is not contacted before a packet is sent.
Transport
35. What is the role of MTA in handling email?
Signal loss can be experienced.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
IP is not properly installed
Time-to-live (TTL)
36. Which layer supplies services and allows user interface?
Application Layer
Destination is not contacted before a packet is sent.
The packets will be delivered and reassembled at destination.
A. show startup-config b. show running-config
37. After an ethernet collision - which device has priority to transmit data?
SSH
Any device whose backoff timer expires first.
Supports error detection.
Minimal delays in data delivery.
38. Which combination of keys can be used to interrupt a ping or traceroute process?
A. low overhead b. connectionless
Window Size
Ctrl + Shift + 6
A. DB 60 b. Winchester 15-pin c. smart serial
39. 2 most commonly used media types in ethernet networks
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Transport
A. copper UTP b. optical fiber
The magnetic field around the adjacent pairs of wire.
40. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
A. Physical b. Data Link
The physical address is added.
A backbone cable.
Network Layer
41. What command can be used to determine if the router has experienced any input or output errors?
Next-Hop Address
A. application b. presentation c. session d. transmision e. network f. data link g. physical
To enable a receiving host to forward the data to the appropriate application.
Show Interfaces
42. Statements that describe LAN
A. show startup-config b. show running-config
Application Layer
To facilitate the entry and exit of data on media.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
43. What is PDU?
Is a layer of specific encapsulation.
A. perform degradation b. security issues c. host identification
The packets will be delivered and reassembled at destination.
A. netstat -r b. route PRINT
44. If you have a small network w/ 3 computers...
Is used by the server to resolve names.
Network address
Supports error detection.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
45. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
UDP
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. DNS b. SMTP c. POP
Identify the device that allows local network computers to communicate w/ devices in other networks.
46. What is the purpose of the TCP/IP Network Application Layer?
0 to 1023
Network Media Control
A physical topology.
A. application b. services
47. What information is added during encapsulation at OSI Layer 3?
Static
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Source and Destination IP address
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
48. During encapsulation - what happens in the Data Link Layer?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
It provides for the exchange of data over a common local media.
The physical address is added.
RJ-45
49. Why is flow control used for TCP data transfer?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
No collisions will occur on this link.
0 to 1023
To prevent the receiver from being overwhelmed by incoming data.
50. What are 3 common problems w/ large networks?
A. purpose b. geographic location c. ownership
0 to 1023
A. perform degradation b. security issues c. host identification
Network