SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If there is a graphic representation of a company network wiring and equipment - What is this called?
Supports error detection.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A physical topology.
A. show startup-config b. show running-config
2. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
Source and Destination IP address
A. show startup-config b. show running-config
It uses lasers as the light source.
It has expanded adressing capabilities.
3. What type of routing uses information that is manually entered into the routing table?
A. non-deterministic b. less overhead c. collisions exist
Static
Network portion
A. purpose b. geographic location c. ownership
4. At which layer of the TCP/IP model does ethernet operate?
A. minimizing of collisions b. division into broadcast domains
Network Access
Minimal delays in data delivery.
A default gateway (router).
5. 3 protocols that operate in the application layer
Resolve IPv4 addresses to MAC addresses.
A. DNS b. SMTP c. POP
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Network Layer Packet
6. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. decentralized resources b. resource sharing w/o a dedicated server
Destination is not contacted before a packet is sent.
The address of the router that the host will use to 'get to the other side'.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
7. What are 2 common characteristics associated w/ dynamic routing protocols?
Originate data flow.
To prevent the receiver from being overwhelmed by incoming data.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Network Media Control
8. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Destination Network Address
255.255.255.224
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. minimizing of collisions b. division into broadcast domains
9. How many bits make up an IPv4 address?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
32 bits
It provides for the exchange of data over a common local media.
0 to 1023
10. What is the proper order of the OSI Layers?
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. addressing b. error detection c. frame delimiting
11. Which IP packet field will prevent endless loops?
A. goodput b. throughput c. bandwidth
Time-to-live (TTL)
The MAC protocol can be very simple.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
12. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
MAC
A. show startup-config b. show running-config
Originate data flow.
A. flow control b. session establishment c. numbering and sequencing
13. What information is added during encapsulation at OSI Layer 3?
A. perform degradation b. security issues c. host identification
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Source and Destination IP address
It does not support encryption.
14. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
255.255.255.0
IP is not properly installed
Binary ANDing
80 (HTTP)
15. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
The MAC protocol can be very simple.
255.255.255.224
Network portion
A. decentralized resources b. resource sharing w/o a dedicated server
16. Where is the IOS file stored at?
A. they initiate data exchanges b. they may upload data to servers
Signal loss can be experienced.
Flash
They must wait until the first hosts finish transfering the media.
17. What is an automated service that matches resource names w/ required IP addresses?
A. low overhead b. connectionless
DNS
UDP
Router(config)# hostname Costas
18. How does the application layer on a server process multiple client requests for services?
Hosts return to listen-before-transmit mode.
A. DNS b. SMTP c. POP
It uses support from the lower layers to distinguish between connections to the service.
Create signals that represent the bits in each frame for the media.
19. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
0 to 1023
A. physical layer b. DLL layer
The address of the router that the host will use to 'get to the other side'.
Ctrl + Shift + 6
20. 3 factors that should be considered when implementing Layer 2 protocols
When connecting a host to a switch.
Window Size
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
21. If you have a small network w/ 3 computers...
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
DNS
Destination is not contacted before a packet is sent.
Switch
22. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
To prevent the receiver from being overwhelmed by incoming data.
UDP
Console interface
Twisting of the cables
23. An admin needs to keep contents private - which access method should he use?
Network address
SSH
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
The physical address is added.
24. Important characteristic of UDP
Router(config)# interface FastEthernet 0/1
0 to 1023
Minimal delays in data delivery.
The packets will be delivered and reassembled at destination.
25. What are the advantages of using a client-server model?
It has expanded adressing capabilities.
Twisting of the cables
TCP initializes the sequence numbers for the sessions.
A. it has centralized administration b. security is easier to enforce
26. Intermediary devices used to implement security between networks
A. router b. firewall
Signal loss can be experienced.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Show Interfaces
27. What statements describe the logical token-passing topology?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
0 to 1023
Flash
UTP
28. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
Network address
FTP
A. media sharing b. logical topology
Switch
29. What is dinamically selected by the source host when forwarding data?
A. Physical b. Data Link
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Source Port
It provides for the exchange of data over a common local media.
30. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
Next-Hop Address
A. decentralized resources b. resource sharing w/o a dedicated server
Transport
172.16.192.160
31. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
The packets will be delivered and reassembled at destination.
Hub
Network Access
Window Size
32. What makes fiber preferable to copper for interconnecting buildings?
Twisting of the cables
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Destination is not contacted before a packet is sent.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
33. What method of signal transmission uses radio waves to carry signals?
A. minimizing of collisions b. division into broadcast domains
Is used by the server to resolve names.
Wireless
Binary ANDing
34. What is the primary rope of the physical layer in transmitting data?
Console
Create signals that represent the bits in each frame for the media.
Physical
It has expanded adressing capabilities.
35. In a connectionless system - What is correct?
Destination is not contacted before a packet is sent.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A default gateway (router).
The magnetic field around the adjacent pairs of wire.
36. What can get you to an outside network?
Fiber
A default gateway (router).
Next-Hop Address
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
37. What is the primary reason for developing IPv6?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
When connecting a host to a switch.
It has expanded adressing capabilities.
Fiber
38. 3 features of IPv6
Source Port
Network portion
A. larger address space b. data types and classes of service c. authentication and encryption
Create signals that represent the bits in each frame for the media.
39. When do changes take effect in a Cisco router?
As the commands are entered.
The magnetic field around the adjacent pairs of wire.
Transport
Static
40. What are 3 pieces of info about a route contained in a routing table?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
UDP
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. next-hop b. metric/interface c. destination network address
41. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. minimizing of collisions b. division into broadcast domains
Any device whose backoff timer expires first.
Network Layer Packet
42. What is the purpose of the preamble in an ethernet frame?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. purpose b. geographic location c. ownership
Network Access
172.16.192.160
43. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
Network address
It provides for the exchange of data over a common local media.
A backbone cable.
Transport
44. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
A. low overhead b. connectionless
A. physical layer b. DLL layer
Supports error detection.
A. replace a switch w/ a router b. subnet the new networks
45. What 2 type of cables would most commonly be used for new runs?
Source and Destination IP address
A. Cat5 UTP b. Cat6 UTP
SMB
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
46. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Wireless
To prevent the receiver from being overwhelmed by incoming data.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
47. What device can check for faults - integrity and performance of media?
Next-Hop Address
OTDR
The packets will be delivered and reassembled at destination.
Destination is not contacted before a packet is sent.
48. When destination network is not in the routing table - What are 2 actions the router might take?
To prevent the receiver from being overwhelmed by incoming data.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Supports error detection.
49. Why are port numbers included in the TCP header of a segment?
A. DNS b. SMTP c. POP
To enable a receiving host to forward the data to the appropriate application.
IP is not properly installed
When connecting a host to a switch.
50. What command is used to change the default name to 'Costas'?
To enable a receiving host to forward the data to the appropriate application.
A. Cat5 UTP b. Cat6 UTP
Router(config)# hostname Costas
Collisions can decrease network performance.