SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a protocol that provides connectionless network layer services?
A. decentralized resources b. resource sharing w/o a dedicated server
IP Protocol
It provides interface between applications on either end of the network.
Host mobility
2. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
Time-to-live (TTL)
A. performance degradation b. security issues c. host identification
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Network Layer Packet
3. What can you identify when you examine the Network Layer header?
A. copper UTP b. optical fiber
The destination host address.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. Physical b. Data Link
4. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
UDP
255.255.255.224
A random delay helps prevent the stations from experiencing another collision during transmission.
A. copper UTP b. optical fiber
5. What is a drawback of the CSMA/CD access method?
It provides interface between applications on either end of the network.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Next-Hop Address
Collisions can decrease network performance.
6. What info is found in the TCP and UDP header info?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Originate data flow.
Ctrl + Shift + 6
Source and Destination Ports
7. Which portion of the network layer address does a router use to forward packets?
Signal loss can be experienced.
Flash
Network portion
Is a layer of specific encapsulation.
8. Which type of cable is most often associated w/ fiber-optic cable?
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
172.16.192.160
When connecting a host to a switch.
A backbone cable.
9. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
A. performance degradation b. security issues c. host identification
2046
A backbone cable.
It provides for the exchange of data over a common local media.
10. Which combination of keys can be used to interrupt a ping or traceroute process?
A. minimizing of collisions b. division into broadcast domains
2046
Rollover cable
Ctrl + Shift + 6
11. What are 2 commands used to view a host routing table?
0 to 1023
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. netstat -r b. route PRINT
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
12. Which IP packet field will prevent endless loops?
Time-to-live (TTL)
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. hot keys b. context-sensitive c. command syntax check
Router(config)# hostname Costas
13. 3 features that allow TCP to realibly and accurately track the transmission of data
It does not support encryption.
A random delay helps prevent the stations from experiencing another collision during transmission.
A. flow control b. session establishment c. numbering and sequencing
Network Access
14. What correctly describes a MAC address?
A. media sharing b. logical topology
IP is not properly installed
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
RJ-45
15. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
0 to 1023
Router(config)# interface FastEthernet 0/1
MAC
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
16. What is PDU?
It provides interface between applications on either end of the network.
A. Physical b. Data Link
Is a layer of specific encapsulation.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
17. 3 terms that define the forms of help available within the Cisco IOS
The MAC protocol can be very simple.
When connecting a host to a switch.
A. hot keys b. context-sensitive c. command syntax check
It uses lasers as the light source.
18. In a connectionless system - What is correct?
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A. netstat -r b. route PRINT
They must wait until the first hosts finish transfering the media.
Destination is not contacted before a packet is sent.
19. 2 features that make switches preferable to hubs
SSH
A. addressing b. error detection c. frame delimiting
A. minimizing of collisions b. division into broadcast domains
A. next-hop b. metric/interface c. destination network address
20. What is a characteristic of a single-mode fiber-optic cable?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. show startup-config b. show running-config
80 (HTTP)
It uses lasers as the light source.
21. What is the function of the DLL?
A. performance degradation b. security issues c. host identification
It provides for the exchange of data over a common local media.
Rollover cable
Source and Destination IP address
22. What can get you to an outside network?
A. DB 60 b. Winchester 15-pin c. smart serial
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A default gateway (router).
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
23. 3 statements of media acess control
Source and Destination Ports
A. Physical b. Data Link
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
24. What application layer protocol is used to support file transfers between client and server?
FTP
Is used by the server to resolve names.
The magnetic field around the adjacent pairs of wire.
Fiber
25. During encapsulation - what happens in the Data Link Layer?
Next-Hop Address
Host mobility
A. MTA b. SMTP
The physical address is added.
26. If you have a small network w/ 3 computers...
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
The packets will be delivered and reassembled at destination.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Host mobility
27. Group of hosts that have identical bit patterns in the high order bits of their addresses
Logical Link Control sublayer
A. application b. services
Network
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
28. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
255.255.255.0
A. minimizing of collisions b. division into broadcast domains
A. it has centralized administration b. security is easier to enforce
Switch
29. What is a component of a routing table entry?
Console
FTP
The packets will be delivered and reassembled at destination.
Next-Hop Address
30. What is the purpose of resource records in DNS?
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Network
Is used by the server to resolve names.
Signal loss can be experienced.
31. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Any device whose backoff timer expires first.
Physical
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
32. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
MAC
TCP initializes the sequence numbers for the sessions.
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
33. 3 facts about the network portion of an IPv4 address
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Hub
A. Cat5 UTP b. Cat6 UTP
A. the router will discard the packet b. the router will send a time exceeded message to the source host
34. What is a characteristic of a logical point-to-point topology?
The MAC protocol can be very simple.
Originate data flow.
Router(config)# hostname Costas
To prevent the receiver from being overwhelmed by incoming data.
35. During a TCP session - if packets arrive out of order - what will happen?
The packets will be delivered and reassembled at destination.
A. Cat5 UTP b. Cat6 UTP
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. DNS b. SMTP c. POP
36. What networking devices are recommended to be assigned static IP addresses?
A. decentralized resources b. resource sharing w/o a dedicated server
0 to 1023
A. servers b. routers c. network printers
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
37. What are 3 common problems w/ large networks?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. perform degradation b. security issues c. host identification
Router(config)# hostname Costas
Wireless
38. What connectors are commonly associated w/ Cisco's V.35 serial cables?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
2046
Network portion
A. DB 60 b. Winchester 15-pin c. smart serial
39. 3 measures of data transfer
Supports error detection.
The address of the router that the host will use to 'get to the other side'.
A. goodput b. throughput c. bandwidth
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
40. What statements describe the logical token-passing topology?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Minimal delays in data delivery.
A default gateway (router).
41. At which layer of the TCP/IP model does ethernet operate?
Network Access
2046
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
Rollover cable
42. What is a disadvantage of Telnet?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
OTDR
It does not support encryption.
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
43. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. copper UTP b. optical fiber
Window Size
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
SSH
44. What is the primary function of encapsulating packets into frames?
To facilitate the entry and exit of data on media.
A. servers b. routers c. network printers
Router(config)# interface FastEthernet 0/1
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
45. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
Is a layer of specific encapsulation.
A. enable mode b. priviledge executive mode
Minimal delays in data delivery.
Fiber
46. What are 2 forms of application layer software?
Router
A. servers b. routers c. network printers
Static
A. application b. services
47. 2 characteristics of peer-2-peer
A. non-deterministic b. less overhead c. collisions exist
TCP initializes the sequence numbers for the sessions.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. decentralized resources b. resource sharing w/o a dedicated server
48. What are 2 protocols for transfering web resources?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. HTTP b. HTTPS
A. flow control b. session establishment c. numbering and sequencing
UTP
49. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Destination Network Address
A. show startup-config b. show running-config
Supports error detection.
50. There are too many broadcasts on switches - what can be done?
Network Access
A. non-deterministic b. less overhead c. collisions exist
Console interface
A. replace a switch w/ a router b. subnet the new networks