SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the role of the OSI Application Layer?
It provides interface between applications on either end of the network.
When connecting a host to a switch.
A. minimizing of collisions b. division into broadcast domains
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
2. What is a benefit of a WAN?
Any device whose backoff timer expires first.
A. addressing b. error detection c. frame delimiting
Host mobility
A. application b. services
3. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
Signal loss can be experienced.
Binary ANDing
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
It provides interface between applications on either end of the network.
4. What is a component of a routing table entry?
DNS
UTP
Next-Hop Address
It provides interface between applications on either end of the network.
5. If you have a small network w/ 3 computers...
The physical address is added.
Hosts return to listen-before-transmit mode.
The MAC protocol can be very simple.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
6. What information is added during encapsulation at OSI Layer 3?
172.16.192.160
A. servers b. routers c. network printers
SSH
Source and Destination IP address
7. What causes crosstalk within cable pairs when using UTP?
Router(config)# hostname Costas
Network address
The magnetic field around the adjacent pairs of wire.
Source Port
8. What method of signal transmission uses radio waves to carry signals?
Network portion
It provides interface between applications on either end of the network.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Wireless
9. On a ethernet segment - why do hosts that experience a collision use a random delay before attempting to transmit?
A. servers b. routers c. network printers
Host mobility
A random delay helps prevent the stations from experiencing another collision during transmission.
When connecting a host to a switch.
10. What are 3 properties of contention-based media access for a shared media?
0 to 1023
The MAC protocol can be very simple.
A. non-deterministic b. less overhead c. collisions exist
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
11. What event occurs during the 3-way handshake?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
To facilitate the entry and exit of data on media.
TCP initializes the sequence numbers for the sessions.
Supports error detection.
12. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
8
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Next-Hop Address
A. it has centralized administration b. security is easier to enforce
13. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
UTP
255.255.255.224
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. purpose b. geographic location c. ownership
14. In business LANs - which connector is used w/ twisted-pair networking cable?
RJ-45
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
32 bits
To prevent the receiver from being overwhelmed by incoming data.
15. Why is flow control used for TCP data transfer?
Wireless
To prevent the receiver from being overwhelmed by incoming data.
255.255.255.0
OTDR
16. 2 most commonly used media types in ethernet networks
RJ-45
A. copper UTP b. optical fiber
Flash
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
17. 2 characteristics of clients in data networks
Source and Destination IP address
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. they initiate data exchanges b. they may upload data to servers
Any device whose backoff timer expires first.
18. 3 protocols that operate in the application layer
A. DNS b. SMTP c. POP
Network Media Control
Network
Network Access
19. What is the function of the DLL?
It provides for the exchange of data over a common local media.
Logical Link Control sublayer
Minimal delays in data delivery.
Originate data flow.
20. What 2 type of cables would most commonly be used for new runs?
A. Cat5 UTP b. Cat6 UTP
IP Protocol
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
21. What characteristic of an UTP helps reduce interference?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Twisting of the cables
Supports error detection.
A. they initiate data exchanges b. they may upload data to servers
22. If the router says: 'Switch-East4#' What identifies the CLI mode represented?
IP is not properly installed
A. enable mode b. priviledge executive mode
Signal loss can be experienced.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
23. Which layer supplies services and allows user interface?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
As the commands are entered.
Application Layer
24. 3 features that allow TCP to realibly and accurately track the transmission of data
0 to 1023
SSH
A. flow control b. session establishment c. numbering and sequencing
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
25. What is a characteristic of a logical point-to-point topology?
The physical address is added.
A backbone cable.
The MAC protocol can be very simple.
A. DNS b. SMTP c. POP
26. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
Fiber
32 bits
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. non-deterministic b. less overhead c. collisions exist
27. What is the purpose of resource records in DNS?
Is used by the server to resolve names.
A. goodput b. throughput c. bandwidth
SMB
A. physical layer b. DLL layer
28. 3 statements about the role of routers in the network
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. Physical b. Data Link
Binary ANDing
29. If you have a full-duplex operational network - what can happen?
No collisions will occur on this link.
It provides interface between applications on either end of the network.
A. goodput b. throughput c. bandwidth
To enable a receiving host to forward the data to the appropriate application.
30. Statements that describe LAN
Router(config)# interface FastEthernet 0/1
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
SSH
RJ-45
31. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. HTTP b. HTTPS
Time-to-live (TTL)
IP is not properly installed
32. What kind of problems are caused by excessive broadcast traffic on network segments?
Router(config)# hostname Costas
A. DNS b. SMTP c. POP
A default gateway (router).
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
33. Which 2 options represent Layer 4 addressing?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
When connecting a host to a switch.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
It uses lasers as the light source.
34. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
2046
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Network portion
A. decentralized resources b. resource sharing w/o a dedicated server
35. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
OTDR
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. it has centralized administration b. security is easier to enforce
Network Layer Packet
36. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Host mobility
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
37. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Network Access
It reduces unnecessary broadcasts.
Hub
38. An admin needs to keep contents private - which access method should he use?
It reduces unnecessary broadcasts.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
SSH
DNS
39. What are key considering factors when grouping hosts into common networks?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Switch
SMB
A. purpose b. geographic location c. ownership
40. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
Rollover cable
The packets will be delivered and reassembled at destination.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Any device whose backoff timer expires first.
41. Important characteristic of UDP
A physical topology.
Twisting of the cables
Minimal delays in data delivery.
A random delay helps prevent the stations from experiencing another collision during transmission.
42. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. What type of routing uses information that is manually entered into the routing table?
A. flow control b. session establishment c. numbering and sequencing
The MAC protocol can be very simple.
Static
When connecting a host to a switch.
44. When is a straight-through cable used in a network?
When connecting a host to a switch.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Source Port
32 bits
45. What are 2 email components used to forward mail between servers?
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. MTA b. SMTP
A. enable mode b. priviledge executive mode
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
46. To make a console connection from a comp to a Cisco router - what cable should be used?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Rollover cable
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
47. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
A. router b. firewall
A. Cat5 UTP b. Cat6 UTP
Router(config)# interface FastEthernet 0/1
A. decentralized resources b. resource sharing w/o a dedicated server
48. Default Gateway is incorrect on the host - What is the impact on the communications?
Identify processes or services that are communicating with end devices.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Identify the device that allows local network computers to communicate w/ devices in other networks.
It uses support from the lower layers to distinguish between connections to the service.
49. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
A. Cat5 UTP b. Cat6 UTP
0 to 1023
255.255.255.0
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
50. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
A. hot keys b. context-sensitive c. command syntax check
Switch
Binary ANDing
IP is not properly installed