SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If you have a full-duplex operational network - what can happen?
RJ-45
No collisions will occur on this link.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
2. What can be a problem that is reduced by adding end-to-end addressing?
It reduces unnecessary broadcasts.
FTP
A. decentralized resources b. resource sharing w/o a dedicated server
Time-to-live (TTL)
3. 2 features that make switches preferable to hubs
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Network Media Control
A. minimizing of collisions b. division into broadcast domains
Source and Destination Ports
4. If there is a graphic representation of a company network wiring and equipment - What is this called?
A physical topology.
Source and Destination Ports
The physical address is added.
Network Access
5. Why is flow control used for TCP data transfer?
To prevent the receiver from being overwhelmed by incoming data.
A. physical layer b. DLL layer
A. performance degradation b. security issues c. host identification
A. Physical b. Data Link
6. Default Gateway is incorrect on the host - What is the impact on the communications?
Next-Hop Address
A. HTTP b. HTTPS
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. Physical b. Data Link
7. 3 statements about the role of routers in the network
A. decentralized resources b. resource sharing w/o a dedicated server
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
It reduces unnecessary broadcasts.
8. Which portion of the network layer address does a router use to forward packets?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Network portion
A. purpose b. geographic location c. ownership
The address of the router that the host will use to 'get to the other side'.
9. At which layers of the OSI model does ethernet operate?
A. physical layer b. DLL layer
Console
2046
Time-to-live (TTL)
10. Network Protocols
Host A
A. non-deterministic b. less overhead c. collisions exist
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
To facilitate the entry and exit of data on media.
11. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
Window Size
It provides interface between applications on either end of the network.
It has expanded adressing capabilities.
A backbone cable.
12. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
2046
Network Media Control
A. Cat5 UTP b. Cat6 UTP
13. What is a drawback of the CSMA/CD access method?
Collisions can decrease network performance.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
SSH
The MAC protocol can be very simple.
14. 3 facts about the network portion of an IPv4 address
8
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Network Layer Packet
15. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
Router(config)# interface FastEthernet 0/1
No collisions will occur on this link.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
It provides interface between applications on either end of the network.
16. An admin needs to keep contents private - which access method should he use?
Hub
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
SSH
Window Size
17. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
Supports error detection.
It uses lasers as the light source.
Rollover cable
255.255.255.0
18. After an ethernet collision - which device has priority to transmit data?
Any device whose backoff timer expires first.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Destination Network Address
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
19. What are 2 forms of application layer software?
A. perform degradation b. security issues c. host identification
A. application b. services
Minimal delays in data delivery.
A physical topology.
20. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
A. Physical b. Data Link
To enable a receiving host to forward the data to the appropriate application.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Destination Network Address
21. What makes fiber preferable to copper for interconnecting buildings?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Rollover cable
Identify processes or services that are communicating with end devices.
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
22. During encapsulation - what happens in the Data Link Layer?
The physical address is added.
Logical Link Control sublayer
UTP
Rollover cable
23. If you have a small network w/ 3 computers...
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A random delay helps prevent the stations from experiencing another collision during transmission.
Application Layer
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
24. What is a protocol that provides connectionless network layer services?
IP Protocol
Is used by the server to resolve names.
A. DNS b. SMTP c. POP
172.16.192.160
25. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
SMB
A backbone cable.
A. DB 60 b. Winchester 15-pin c. smart serial
Fiber
26. What networking devices are recommended to be assigned static IP addresses?
A. servers b. routers c. network printers
A. non-deterministic b. less overhead c. collisions exist
Application Layer
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
27. What method of signal transmission uses radio waves to carry signals?
Is a layer of specific encapsulation.
Any device whose backoff timer expires first.
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Wireless
28. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
A default gateway (router).
A. perform degradation b. security issues c. host identification
Show Interfaces
Destination Network Address
29. What information is added during encapsulation at OSI Layer 3?
Router
Source and Destination IP address
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
32 bits
30. What is the role of MTA in handling email?
A. performance degradation b. security issues c. host identification
Physical
Resolve IPv4 addresses to MAC addresses.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
31. What device can check for faults - integrity and performance of media?
Network address
OTDR
To prevent the receiver from being overwhelmed by incoming data.
Host A
32. 3 features that allow TCP to realibly and accurately track the transmission of data
A. DB 60 b. Winchester 15-pin c. smart serial
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. flow control b. session establishment c. numbering and sequencing
33. When a device is moved from one network to the other...?
The packets will be delivered and reassembled at destination.
A backbone cable.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
Twisting of the cables
34. 3 properties of peer-2-peer applications
A. decentralized resources b. resource sharing w/o a dedicated server
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Resolve IPv4 addresses to MAC addresses.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
35. statements of IP adressing
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Router
A. low overhead b. connectionless
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
36. 2 characteristics of clients in data networks
A. they initiate data exchanges b. they may upload data to servers
UDP
Network Media Control
Identify the device that allows local network computers to communicate w/ devices in other networks.
37. What 2 type of cables would most commonly be used for new runs?
UTP
Minimal delays in data delivery.
It provides for the exchange of data over a common local media.
A. Cat5 UTP b. Cat6 UTP
38. What is a disadvantage of Telnet?
A. next-hop b. metric/interface c. destination network address
A. copper UTP b. optical fiber
It does not support encryption.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
39. At which layer of the TCP/IP model does ethernet operate?
A. performance degradation b. security issues c. host identification
Network Access
A. low overhead b. connectionless
Physical
40. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Fiber
Physical
Minimal delays in data delivery.
It does not support encryption.
41. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
32 bits
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
42. What are 3 pieces of info about a route contained in a routing table?
Rollover cable
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. next-hop b. metric/interface c. destination network address
80 (HTTP)
43. 3 statements about routes and their use
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Next-Hop Address
Source and Destination IP address
Rollover cable
44. What command is used to change the default name to 'Costas'?
Router(config)# hostname Costas
Destination Network Address
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Minimal delays in data delivery.
45. What is the role of the OSI Application Layer?
As the commands are entered.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Network Media Control
It provides interface between applications on either end of the network.
46. Intermediary devices used to implement security between networks
Destination is not contacted before a packet is sent.
Binary ANDing
A. router b. firewall
A. Cat5 UTP b. Cat6 UTP
47. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Router(config)# interface FastEthernet 0/1
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
It has expanded adressing capabilities.
48. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. Cat5 UTP b. Cat6 UTP
80 (HTTP)
Destination is not contacted before a packet is sent.
49. What kind of problems are caused by excessive broadcast traffic on network segments?
No collisions will occur on this link.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. goodput b. throughput c. bandwidth
50. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Router
SMB
Application Layer