SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What method of signal transmission uses radio waves to carry signals?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
DNS
A. Cat5 UTP b. Cat6 UTP
Wireless
2. If you have a full-duplex operational network - what can happen?
No collisions will occur on this link.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
The destination host address.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
3. What is the primary rope of the physical layer in transmitting data?
Create signals that represent the bits in each frame for the media.
A. servers b. routers c. network printers
A. low overhead b. connectionless
Host mobility
4. What is a protocol that provides connectionless network layer services?
IP Protocol
Fiber
RJ-45
A. it has centralized administration b. security is easier to enforce
5. 3 protocols that operate in the application layer
TCP initializes the sequence numbers for the sessions.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. DNS b. SMTP c. POP
MAC
6. What statements describe the logical token-passing topology?
Supports error detection.
A. hot keys b. context-sensitive c. command syntax check
SMB
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
7. 3 terms that define the forms of help available within the Cisco IOS
IP Protocol
A. hot keys b. context-sensitive c. command syntax check
Network
A. netstat -r b. route PRINT
8. What causes crosstalk within cable pairs when using UTP?
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
The magnetic field around the adjacent pairs of wire.
A. enable mode b. priviledge executive mode
UDP
9. What determines the method of media access control?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. media sharing b. logical topology
DNS
When connecting a host to a switch.
10. 2 features that make switches preferable to hubs
80 (HTTP)
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. application b. services
A. minimizing of collisions b. division into broadcast domains
11. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
A. netstat -r b. route PRINT
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Transport
Console
12. What is an automated service that matches resource names w/ required IP addresses?
DNS
OTDR
Supports error detection.
Wireless
13. What characteristic of an UTP helps reduce interference?
Destination Network Address
A. purpose b. geographic location c. ownership
Twisting of the cables
A. hot keys b. context-sensitive c. command syntax check
14. What layer encapsulates segments into packets?
Network Layer
Show Interfaces
Flash
Fiber
15. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
Console interface
A backbone cable.
Hub
A. show startup-config b. show running-config
16. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
80 (HTTP)
Supports error detection.
Static
A. media sharing b. logical topology
17. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
0 to 1023
8
Create signals that represent the bits in each frame for the media.
A. flow control b. session establishment c. numbering and sequencing
18. What is the purpose of resource records in DNS?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Is used by the server to resolve names.
When connecting a host to a switch.
Any device whose backoff timer expires first.
19. What are 2 features of User Diagram Protocol (UDP)?
Console interface
No collisions will occur on this link.
Is a layer of specific encapsulation.
A. low overhead b. connectionless
20. What is a characteristic of a logical point-to-point topology?
Fiber
172.16.192.160
Rollover cable
The MAC protocol can be very simple.
21. What is the primary purpose of ARP?
8
Resolve IPv4 addresses to MAC addresses.
A. goodput b. throughput c. bandwidth
A. identifies the communicating applications b. identifies multiple conversations between the hosts
22. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Hosts return to listen-before-transmit mode.
Minimal delays in data delivery.
The destination host address.
Transport
23. When destination network is not in the routing table - What are 2 actions the router might take?
Identify processes or services that are communicating with end devices.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. it has centralized administration b. security is easier to enforce
Network Layer Packet
24. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
UDP
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Hub
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
25. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
Network Layer Packet
Switch
IP Protocol
Network
26. What networking devices are recommended to be assigned static IP addresses?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
FTP
Destination is not contacted before a packet is sent.
A. servers b. routers c. network printers
27. How does the application layer on a server process multiple client requests for services?
It uses support from the lower layers to distinguish between connections to the service.
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Network Media Control
A. not affected by EMI of RFI b. most expensive type of LAN cabling
28. What are 3 properties of contention-based media access for a shared media?
Logical Link Control sublayer
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. non-deterministic b. less overhead c. collisions exist
29. Group of hosts that have identical bit patterns in the high order bits of their addresses
Switch
80 (HTTP)
Network
Hub
30. 3 statements of media acess control
It uses support from the lower layers to distinguish between connections to the service.
A default gateway (router).
Host A
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
31. Which layer supplies services and allows user interface?
Application Layer
Network Access
0 to 1023
A. MTA b. SMTP
32. statements of IP adressing
0 to 1023
As the commands are entered.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Originate data flow.
33. Important characteristic of UDP
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Minimal delays in data delivery.
A. larger address space b. data types and classes of service c. authentication and encryption
A. perform degradation b. security issues c. host identification
34. How many bits make up an IPv4 address?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
No collisions will occur on this link.
It reduces unnecessary broadcasts.
32 bits
35. What are 2 common characteristics associated w/ dynamic routing protocols?
Is used by the server to resolve names.
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Any device whose backoff timer expires first.
SSH
36. An admin needs to keep contents private - which access method should he use?
SSH
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Identify processes or services that are communicating with end devices.
37. What is a disadvantage of Telnet?
It does not support encryption.
Static
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Window Size
38. What device can check for faults - integrity and performance of media?
Router
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
OTDR
A. Physical b. Data Link
39. Which IP packet field will prevent endless loops?
TCP initializes the sequence numbers for the sessions.
Time-to-live (TTL)
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Ctrl + Shift + 6
40. What command can be used to determine if the router has experienced any input or output errors?
A. goodput b. throughput c. bandwidth
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Show Interfaces
Network Access
41. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Physical
They must wait until the first hosts finish transfering the media.
The MAC protocol can be very simple.
42. When do changes take effect in a Cisco router?
As the commands are entered.
Collisions can decrease network performance.
80 (HTTP)
8
43. During encapsulation - what happens in the Data Link Layer?
The physical address is added.
It provides for the exchange of data over a common local media.
A. media sharing b. logical topology
Signal loss can be experienced.
44. What information is added during encapsulation at OSI Layer 3?
Source and Destination IP address
Console interface
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Source and Destination Ports
45. What is PDU?
OTDR
Fiber
Identify the device that allows local network computers to communicate w/ devices in other networks.
Is a layer of specific encapsulation.
46. What are 2 forms of application layer software?
A. netstat -r b. route PRINT
Physical
A. application b. services
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
47. What can you identify when you examine the Network Layer header?
It uses support from the lower layers to distinguish between connections to the service.
When connecting a host to a switch.
The destination host address.
Router
48. 2 characteristics of peer-2-peer
A. decentralized resources b. resource sharing w/o a dedicated server
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. copper UTP b. optical fiber
49. 3 factors that should be considered when implementing Layer 2 protocols
A. MTA b. SMTP
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Application Layer
50. On a ethernet segment - why do hosts that experience a collision use a random delay before attempting to transmit?
Router
Source and Destination Ports
No collisions will occur on this link.
A random delay helps prevent the stations from experiencing another collision during transmission.