SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
Destination is not contacted before a packet is sent.
2046
Twisting of the cables
Rollover cable
2. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
DNS
Destination Network Address
Identify the device that allows local network computers to communicate w/ devices in other networks.
3. 3 protocols that operate in the application layer
Rollover cable
It uses support from the lower layers to distinguish between connections to the service.
A. DNS b. SMTP c. POP
RJ-45
4. What is a characteristic of a single-mode fiber-optic cable?
A. they initiate data exchanges b. they may upload data to servers
It uses lasers as the light source.
A. goodput b. throughput c. bandwidth
A. application b. presentation c. session d. transmision e. network f. data link g. physical
5. What is dinamically selected by the source host when forwarding data?
Source Port
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
0 to 1023
A. netstat -r b. route PRINT
6. What determines the method of media access control?
A. media sharing b. logical topology
A. they initiate data exchanges b. they may upload data to servers
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Static
7. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
Binary ANDing
Host mobility
255.255.255.224
A. copper UTP b. optical fiber
8. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
It does not support encryption.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. router b. firewall
9. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. 3 factors that should be considered when implementing Layer 2 protocols
A. show startup-config b. show running-config
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
The address of the router that the host will use to 'get to the other side'.
UDP
11. What describes the purpose of default route?
80 (HTTP)
A. low overhead b. connectionless
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Signal loss can be experienced.
12. 2 most commonly used media types in ethernet networks
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. copper UTP b. optical fiber
Logical Link Control sublayer
Wireless
13. There are too many broadcasts on switches - what can be done?
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. router b. firewall
A. replace a switch w/ a router b. subnet the new networks
A. it has centralized administration b. security is easier to enforce
14. 3 statements about routes and their use
Window Size
Collisions can decrease network performance.
2046
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
15. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
Network Access
No collisions will occur on this link.
Binary ANDing
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
16. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
OTDR
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Destination is not contacted before a packet is sent.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
17. What method of signal transmission uses radio waves to carry signals?
Wireless
SSH
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Flash
18. Which combination of keys can be used to interrupt a ping or traceroute process?
Destination Network Address
The destination host address.
Ctrl + Shift + 6
Console interface
19. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. replace a switch w/ a router b. subnet the new networks
20. What are 2 email components used to forward mail between servers?
Hub
Is a layer of specific encapsulation.
A. MTA b. SMTP
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
21. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
Fiber
Network address
A. minimizing of collisions b. division into broadcast domains
Console interface
22. What do the intermediary devices in the network do?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Physical
A. media sharing b. logical topology
A. it has centralized administration b. security is easier to enforce
23. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
MAC
A. MTA b. SMTP
255.255.255.224
Destination Network Address
24. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
A physical topology.
80 (HTTP)
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
To prevent the receiver from being overwhelmed by incoming data.
25. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
172.16.192.160
Is a layer of specific encapsulation.
255.255.255.224
A. low overhead b. connectionless
26. 3 primary functions of the data link layer encapsulation
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A random delay helps prevent the stations from experiencing another collision during transmission.
Any device whose backoff timer expires first.
A. addressing b. error detection c. frame delimiting
27. Which layer supplies services and allows user interface?
Signal loss can be experienced.
Identify processes or services that are communicating with end devices.
Application Layer
Flash
28. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
172.16.192.160
FTP
Fiber
They must wait until the first hosts finish transfering the media.
29. If you have a small network w/ 3 computers...
A. replace a switch w/ a router b. subnet the new networks
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
TCP initializes the sequence numbers for the sessions.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
30. Intermediary devices used to implement security between networks
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. router b. firewall
Router(config)# interface FastEthernet 0/1
Host mobility
31. 3 characteristics of valid Ethernet Layer 2 addresses
SMB
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Window Size
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
32. What characteristic of an UTP helps reduce interference?
SSH
Router(config)# interface FastEthernet 0/1
Twisting of the cables
The physical address is added.
33. 2 functions of encapsulation
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
RJ-45
A. netstat -r b. route PRINT
34. 3 properties of peer-2-peer applications
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Show Interfaces
35. What layer encapsulates segments into packets?
Network address
Physical
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Network Layer
36. Where is the IOS file stored at?
A. goodput b. throughput c. bandwidth
The address of the router that the host will use to 'get to the other side'.
Rollover cable
Flash
37. What is the primary purpose of ARP?
It provides for the exchange of data over a common local media.
A. flow control b. session establishment c. numbering and sequencing
Resolve IPv4 addresses to MAC addresses.
A. copper UTP b. optical fiber
38. What is the role of MTA in handling email?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. minimizing of collisions b. division into broadcast domains
Destination Network Address
39. Which IP packet field will prevent endless loops?
OTDR
A. it has centralized administration b. security is easier to enforce
Time-to-live (TTL)
A. Cat5 UTP b. Cat6 UTP
40. What command is used to change the default name to 'Costas'?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Router(config)# hostname Costas
DNS
Static
41. If you have a full-duplex operational network - what can happen?
Console
Source and Destination IP address
Network Layer
No collisions will occur on this link.
42. What do end devices do?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Originate data flow.
43. Why is flow control used for TCP data transfer?
A. next-hop b. metric/interface c. destination network address
To prevent the receiver from being overwhelmed by incoming data.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
44. 2 characteristics of peer-2-peer
A physical topology.
A. enable mode b. priviledge executive mode
A. decentralized resources b. resource sharing w/o a dedicated server
A random delay helps prevent the stations from experiencing another collision during transmission.
45. What type of routing uses information that is manually entered into the routing table?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Static
A. purpose b. geographic location c. ownership
32 bits
46. What is the purpose of the TCP/IP Network Application Layer?
OTDR
RJ-45
MAC
Network Media Control
47. What statements describe the logical token-passing topology?
A. Physical b. Data Link
Minimal delays in data delivery.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Hosts return to listen-before-transmit mode.
48. After an ethernet collision - which device has priority to transmit data?
Host A
A. purpose b. geographic location c. ownership
Any device whose backoff timer expires first.
A. perform degradation b. security issues c. host identification
49. What are 2 forms of application layer software?
Flash
A. replace a switch w/ a router b. subnet the new networks
The destination host address.
A. application b. services
50. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
SMB
Supports error detection.
A. show startup-config b. show running-config
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other