SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If you have a small network w/ 3 computers...
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
The address of the router that the host will use to 'get to the other side'.
Destination Network Address
2. What are 2 forms of application layer software?
It uses lasers as the light source.
DNS
A. media sharing b. logical topology
A. application b. services
3. During encapsulation - what happens in the Data Link Layer?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Router(config)# interface FastEthernet 0/1
The physical address is added.
4. What describes the purpose of default route?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Hub
Collisions can decrease network performance.
5. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Switch
Signal loss can be experienced.
A. Physical b. Data Link
6. Which portion of the network layer address does a router use to forward packets?
Time-to-live (TTL)
A. perform degradation b. security issues c. host identification
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Network portion
7. 2 features that make switches preferable to hubs
Next-Hop Address
Resolve IPv4 addresses to MAC addresses.
A. minimizing of collisions b. division into broadcast domains
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
8. How does the application layer on a server process multiple client requests for services?
Router
It uses support from the lower layers to distinguish between connections to the service.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
9. What is a protocol that provides connectionless network layer services?
IP Protocol
A. flow control b. session establishment c. numbering and sequencing
Switch
255.255.255.0
10. Which device is used to create or divide broadcast domains?
Router
A. performance degradation b. security issues c. host identification
Hosts return to listen-before-transmit mode.
Collisions can decrease network performance.
11. What command is used to change the default name to 'Costas'?
Destination Network Address
Router(config)# hostname Costas
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
DNS
12. What application layer protocol is used to support file transfers between client and server?
Next-Hop Address
FTP
A backbone cable.
No collisions will occur on this link.
13. What is the purpose of the preamble in an ethernet frame?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Static
Physical
Next-Hop Address
14. What is the proper order of the OSI Layers?
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. DNS b. SMTP c. POP
15. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Destination Network Address
A. show startup-config b. show running-config
To enable a receiving host to forward the data to the appropriate application.
The physical address is added.
16. What kind of problems are caused by excessive broadcast traffic on network segments?
SSH
Rollover cable
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
8
17. What is the primary purpose of Layer 4?
Router
Identify processes or services that are communicating with end devices.
MAC
Source and Destination IP address
18. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
Create signals that represent the bits in each frame for the media.
Supports error detection.
A. Physical b. Data Link
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
19. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
They must wait until the first hosts finish transfering the media.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Originate data flow.
A. router b. firewall
20. What is dinamically selected by the source host when forwarding data?
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Next-Hop Address
A. non-deterministic b. less overhead c. collisions exist
Source Port
21. What are 2 features of User Diagram Protocol (UDP)?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. router b. firewall
A. low overhead b. connectionless
22. 3 characteristics of valid Ethernet Layer 2 addresses
The physical address is added.
A. application b. services
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Wireless
23. 3 protocols that operate in the application layer
Host A
A. hot keys b. context-sensitive c. command syntax check
It reduces unnecessary broadcasts.
A. DNS b. SMTP c. POP
24. Which IP packet field will prevent endless loops?
OTDR
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Time-to-live (TTL)
25. 3 facts about the network portion of an IPv4 address
Rollover cable
The physical address is added.
FTP
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
26. Intermediary devices used to implement security between networks
Hub
A. enable mode b. priviledge executive mode
Network Layer
A. router b. firewall
27. Which 2 options represent Layer 4 addressing?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
OTDR
Any device whose backoff timer expires first.
To enable a receiving host to forward the data to the appropriate application.
28. 3 statements about the role of routers in the network
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Flash
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
29. What information is added during encapsulation at OSI Layer 3?
Source and Destination IP address
IP is not properly installed
Console
Source Port
30. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
8
Physical
Switch
Router(config)# interface FastEthernet 0/1
31. At which layer of the TCP/IP model does ethernet operate?
Any device whose backoff timer expires first.
A physical topology.
Network Access
TCP initializes the sequence numbers for the sessions.
32. Why is flow control used for TCP data transfer?
Fiber
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. enable mode b. priviledge executive mode
To prevent the receiver from being overwhelmed by incoming data.
33. What info is found in the TCP and UDP header info?
It uses support from the lower layers to distinguish between connections to the service.
A. HTTP b. HTTPS
Identify processes or services that are communicating with end devices.
Source and Destination Ports
34. What statements describe the logical token-passing topology?
Network address
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
It provides for the exchange of data over a common local media.
35. Which type of cable is most often associated w/ fiber-optic cable?
A backbone cable.
IP Protocol
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Is used by the server to resolve names.
36. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
A. HTTP b. HTTPS
A. Physical b. Data Link
Console
Rollover cable
37. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
A. DB 60 b. Winchester 15-pin c. smart serial
Window Size
255.255.255.224
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
38. What can you identify when you examine the Network Layer header?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Destination Network Address
The destination host address.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
39. What connectors are commonly associated w/ Cisco's V.35 serial cables?
The physical address is added.
255.255.255.224
A. DB 60 b. Winchester 15-pin c. smart serial
Hub
40. What is a drawback of the CSMA/CD access method?
A physical topology.
A. perform degradation b. security issues c. host identification
Collisions can decrease network performance.
TCP initializes the sequence numbers for the sessions.
41. 3 common problems w/ a large network
Ctrl + Shift + 6
Originate data flow.
A. performance degradation b. security issues c. host identification
A. application b. services
42. There are too many broadcasts on switches - what can be done?
255.255.255.224
A. replace a switch w/ a router b. subnet the new networks
Destination is not contacted before a packet is sent.
TCP initializes the sequence numbers for the sessions.
43. How many bits make up an IPv4 address?
32 bits
Time-to-live (TTL)
A. application b. services
OTDR
44. 3 measures of data transfer
A. goodput b. throughput c. bandwidth
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Minimal delays in data delivery.
45. 2 characteristics of clients in data networks
DNS
A. they initiate data exchanges b. they may upload data to servers
It provides interface between applications on either end of the network.
Resolve IPv4 addresses to MAC addresses.
46. What device can check for faults - integrity and performance of media?
Network Media Control
OTDR
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. flow control b. session establishment c. numbering and sequencing
47. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
A. physical layer b. DLL layer
A physical topology.
A. they initiate data exchanges b. they may upload data to servers
0 to 1023
48. 3 factors that should be considered when implementing Layer 2 protocols
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
32 bits
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
It provides interface between applications on either end of the network.
49. What makes fiber preferable to copper for interconnecting buildings?
Originate data flow.
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Source and Destination Ports
50. Why are port numbers included in the TCP header of a segment?
To enable a receiving host to forward the data to the appropriate application.
32 bits
Destination is not contacted before a packet is sent.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks