SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the purpose of the preamble in an ethernet frame?
172.16.192.160
Application Layer
It provides for the exchange of data over a common local media.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
2. What are 2 email components used to forward mail between servers?
A. MTA b. SMTP
Hub
A. physical layer b. DLL layer
Console
3. 3 statements about the role of routers in the network
When connecting a host to a switch.
MAC
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
4. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
They must wait until the first hosts finish transfering the media.
A. HTTP b. HTTPS
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
5. 3 properties of peer-2-peer applications
Hosts return to listen-before-transmit mode.
Logical Link Control sublayer
Source Port
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
6. Which 2 options represent Layer 4 addressing?
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. copper UTP b. optical fiber
7. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Destination Network Address
Physical
A backbone cable.
A. physical layer b. DLL layer
8. What do you need to use for an initial configuration on a Cisco router?
A random delay helps prevent the stations from experiencing another collision during transmission.
Network Access
Console interface
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
9. 2 characteristics of clients in data networks
They must wait until the first hosts finish transfering the media.
A backbone cable.
A. they initiate data exchanges b. they may upload data to servers
A. addressing b. error detection c. frame delimiting
10. During a TCP session - if packets arrive out of order - what will happen?
A. enable mode b. priviledge executive mode
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
To prevent the receiver from being overwhelmed by incoming data.
The packets will be delivered and reassembled at destination.
11. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
A. show startup-config b. show running-config
Rollover cable
Destination is not contacted before a packet is sent.
Host A
12. On a ethernet segment - why do hosts that experience a collision use a random delay before attempting to transmit?
A. Cat5 UTP b. Cat6 UTP
A random delay helps prevent the stations from experiencing another collision during transmission.
A. minimizing of collisions b. division into broadcast domains
RJ-45
13. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
A. copper UTP b. optical fiber
To prevent the receiver from being overwhelmed by incoming data.
RJ-45
2046
14. What command is used to change the default name to 'Costas'?
80 (HTTP)
A. hot keys b. context-sensitive c. command syntax check
Router(config)# hostname Costas
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
15. Which layer supplies services and allows user interface?
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Application Layer
Ctrl + Shift + 6
A. show startup-config b. show running-config
16. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
Collisions can decrease network performance.
255.255.255.224
It provides interface between applications on either end of the network.
Identify processes or services that are communicating with end devices.
17. What are 2 features of User Diagram Protocol (UDP)?
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. decentralized resources b. resource sharing w/o a dedicated server
A. low overhead b. connectionless
Transport
18. What is the primary rope of the physical layer in transmitting data?
A default gateway (router).
Create signals that represent the bits in each frame for the media.
The MAC protocol can be very simple.
When connecting a host to a switch.
19. 2 most commonly used media types in ethernet networks
Hosts return to listen-before-transmit mode.
A. low overhead b. connectionless
A. copper UTP b. optical fiber
Host A
20. What causes crosstalk within cable pairs when using UTP?
The magnetic field around the adjacent pairs of wire.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Fiber
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
21. Which combination of keys can be used to interrupt a ping or traceroute process?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Flash
A. replace a switch w/ a router b. subnet the new networks
Ctrl + Shift + 6
22. Important characteristic of UDP
It has expanded adressing capabilities.
Minimal delays in data delivery.
Network Media Control
Router
23. What networking devices are recommended to be assigned static IP addresses?
FTP
A. minimizing of collisions b. division into broadcast domains
Transport
A. servers b. routers c. network printers
24. Which characteristics describe fiber optic cable?
A. it has centralized administration b. security is easier to enforce
Fiber
UTP
A. not affected by EMI of RFI b. most expensive type of LAN cabling
25. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
A random delay helps prevent the stations from experiencing another collision during transmission.
The physical address is added.
No collisions will occur on this link.
MAC
26. What makes fiber preferable to copper for interconnecting buildings?
A. replace a switch w/ a router b. subnet the new networks
To enable a receiving host to forward the data to the appropriate application.
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
27. statements of IP adressing
The MAC protocol can be very simple.
Host mobility
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
28. What layer encapsulates segments into packets?
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Network Layer
A random delay helps prevent the stations from experiencing another collision during transmission.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
29. When is a straight-through cable used in a network?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
When connecting a host to a switch.
A. netstat -r b. route PRINT
SSH
30. What event occurs during the 3-way handshake?
Window Size
TCP initializes the sequence numbers for the sessions.
To enable a receiving host to forward the data to the appropriate application.
The address of the router that the host will use to 'get to the other side'.
31. In a connectionless system - What is correct?
Router(config)# hostname Costas
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Destination is not contacted before a packet is sent.
Static
32. 3 facts about the network portion of an IPv4 address
It uses lasers as the light source.
To enable a receiving host to forward the data to the appropriate application.
Network
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
33. When do changes take effect in a Cisco router?
32 bits
It uses support from the lower layers to distinguish between connections to the service.
Network Layer
As the commands are entered.
34. If there is a graphic representation of a company network wiring and equipment - What is this called?
A. it has centralized administration b. security is easier to enforce
A physical topology.
Transport
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
35. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
A. performance degradation b. security issues c. host identification
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
8
Minimal delays in data delivery.
36. 3 primary functions of the data link layer encapsulation
The destination host address.
A. addressing b. error detection c. frame delimiting
SSH
Supports error detection.
37. What is dinamically selected by the source host when forwarding data?
Application Layer
OTDR
Source Port
A. copper UTP b. optical fiber
38. To make a console connection from a comp to a Cisco router - what cable should be used?
The packets will be delivered and reassembled at destination.
A. goodput b. throughput c. bandwidth
DNS
Rollover cable
39. What are 3 pieces of info about a route contained in a routing table?
OTDR
Window Size
It provides interface between applications on either end of the network.
A. next-hop b. metric/interface c. destination network address
40. 3 terms that define the forms of help available within the Cisco IOS
A. hot keys b. context-sensitive c. command syntax check
A default gateway (router).
It uses support from the lower layers to distinguish between connections to the service.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
41. 3 features of IPv6
A. purpose b. geographic location c. ownership
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. larger address space b. data types and classes of service c. authentication and encryption
A. MTA b. SMTP
42. Which IP packet field will prevent endless loops?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Next-Hop Address
Time-to-live (TTL)
MAC
43. What type of routing uses information that is manually entered into the routing table?
Static
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Identify processes or services that are communicating with end devices.
It uses lasers as the light source.
44. What are the advantages of using a client-server model?
Resolve IPv4 addresses to MAC addresses.
A. larger address space b. data types and classes of service c. authentication and encryption
A. it has centralized administration b. security is easier to enforce
A. router b. firewall
45. Intermediary devices used to implement security between networks
No collisions will occur on this link.
A. router b. firewall
0 to 1023
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
46. What can you identify when you examine the Network Layer header?
A. performance degradation b. security issues c. host identification
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
The destination host address.
47. 2 functions of encapsulation
A. goodput b. throughput c. bandwidth
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. show startup-config b. show running-config
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
48. An admin needs to keep contents private - which access method should he use?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Destination Network Address
SSH
A. non-deterministic b. less overhead c. collisions exist
49. 2 features that make switches preferable to hubs
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. minimizing of collisions b. division into broadcast domains
The MAC protocol can be very simple.
Hosts return to listen-before-transmit mode.
50. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
255.255.255.0
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Is a layer of specific encapsulation.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media