SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
It has expanded adressing capabilities.
Window Size
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
2. How does the application layer on a server process multiple client requests for services?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Wireless
It uses support from the lower layers to distinguish between connections to the service.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
3. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
RJ-45
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
4. What application layer protocol is used to support file transfers between client and server?
FTP
A. enable mode b. priviledge executive mode
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
MAC
5. What is a characteristic of a logical point-to-point topology?
SMB
The MAC protocol can be very simple.
Collisions can decrease network performance.
Time-to-live (TTL)
6. What type of routing uses information that is manually entered into the routing table?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Signal loss can be experienced.
Static
7. 3 functions of the upper data link sublayer in the OSI model
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. DB 60 b. Winchester 15-pin c. smart serial
A. performance degradation b. security issues c. host identification
32 bits
8. What is the primary purpose of ARP?
A. replace a switch w/ a router b. subnet the new networks
A. goodput b. throughput c. bandwidth
Resolve IPv4 addresses to MAC addresses.
Ctrl + Shift + 6
9. 2 characteristics of clients in data networks
A. Physical b. Data Link
Application Layer
SSH
A. they initiate data exchanges b. they may upload data to servers
10. What method of signal transmission uses radio waves to carry signals?
Router(config)# hostname Costas
Wireless
Is a layer of specific encapsulation.
Transport
11. 3 statements about the role of routers in the network
A random delay helps prevent the stations from experiencing another collision during transmission.
Destination is not contacted before a packet is sent.
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
The magnetic field around the adjacent pairs of wire.
12. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
80 (HTTP)
Hub
A. minimizing of collisions b. division into broadcast domains
To prevent the receiver from being overwhelmed by incoming data.
13. If you have a small network w/ 3 computers...
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
2046
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Hosts return to listen-before-transmit mode.
14. 3 characteristics of valid Ethernet Layer 2 addresses
RJ-45
Source Port
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
15. In business LANs - which connector is used w/ twisted-pair networking cable?
Resolve IPv4 addresses to MAC addresses.
RJ-45
A. replace a switch w/ a router b. subnet the new networks
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
16. What are the advantages of using a client-server model?
A. it has centralized administration b. security is easier to enforce
The physical address is added.
They must wait until the first hosts finish transfering the media.
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
17. What does the IEEE 802.2 standard represent in Ethernet technologies?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
The physical address is added.
Logical Link Control sublayer
The MAC protocol can be very simple.
18. When destination network is not in the routing table - What are 2 actions the router might take?
Host mobility
Physical
255.255.255.0
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
19. What is the function of the DLL?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
It provides for the exchange of data over a common local media.
172.16.192.160
Destination Network Address
20. What connectors are commonly associated w/ Cisco's V.35 serial cables?
Any device whose backoff timer expires first.
A. DB 60 b. Winchester 15-pin c. smart serial
Window Size
A. performance degradation b. security issues c. host identification
21. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
A. Cat5 UTP b. Cat6 UTP
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
UDP
80 (HTTP)
22. What device can check for faults - integrity and performance of media?
Network Layer Packet
OTDR
255.255.255.0
A. netstat -r b. route PRINT
23. 3 statements about routes and their use
A. flow control b. session establishment c. numbering and sequencing
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Static
Resolve IPv4 addresses to MAC addresses.
24. What statements describe the logical token-passing topology?
A. non-deterministic b. less overhead c. collisions exist
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
To prevent the receiver from being overwhelmed by incoming data.
25. What are 3 properties of contention-based media access for a shared media?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. non-deterministic b. less overhead c. collisions exist
Window Size
26. There are too many broadcasts on switches - what can be done?
A. replace a switch w/ a router b. subnet the new networks
Source and Destination Ports
OTDR
A physical topology.
27. 3 statements of media acess control
A. show startup-config b. show running-config
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Time-to-live (TTL)
Router(config)# interface FastEthernet 0/1
28. In a connectionless system - What is correct?
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Destination is not contacted before a packet is sent.
A. minimizing of collisions b. division into broadcast domains
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
29. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
0 to 1023
80 (HTTP)
A. enable mode b. priviledge executive mode
It has expanded adressing capabilities.
30. What information is added during encapsulation at OSI Layer 3?
RJ-45
Source and Destination IP address
Router
A backbone cable.
31. What do you need to use for an initial configuration on a Cisco router?
IP Protocol
Source and Destination Ports
Any device whose backoff timer expires first.
Console interface
32. What are 2 protocols for transfering web resources?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Resolve IPv4 addresses to MAC addresses.
A. HTTP b. HTTPS
33. Which 2 options represent Layer 4 addressing?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. servers b. routers c. network printers
Transport
Host mobility
34. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Hosts return to listen-before-transmit mode.
Ctrl + Shift + 6
To prevent the receiver from being overwhelmed by incoming data.
IP is not properly installed
35. What are 2 forms of application layer software?
A. application b. services
A. Cat5 UTP b. Cat6 UTP
A. performance degradation b. security issues c. host identification
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
36. What is the purpose of the preamble in an ethernet frame?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. low overhead b. connectionless
They must wait until the first hosts finish transfering the media.
80 (HTTP)
37. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Physical
Destination Network Address
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Router
38. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Logical Link Control sublayer
They must wait until the first hosts finish transfering the media.
A. addressing b. error detection c. frame delimiting
39. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
A. they initiate data exchanges b. they may upload data to servers
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
A. Cat5 UTP b. Cat6 UTP
Physical
40. What event occurs during the 3-way handshake?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
SMB
TCP initializes the sequence numbers for the sessions.
Transport
41. What is the proper order of the OSI Layers?
Host A
MAC
A. application b. presentation c. session d. transmision e. network f. data link g. physical
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
42. What are 2 email components used to forward mail between servers?
A. MTA b. SMTP
Switch
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. physical layer b. DLL layer
43. Which IP packet field will prevent endless loops?
A. HTTP b. HTTPS
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A physical topology.
Time-to-live (TTL)
44. What can you identify when you examine the Network Layer header?
8
The destination host address.
0 to 1023
Supports error detection.
45. What is the role of MTA in handling email?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Logical Link Control sublayer
Host mobility
A. they initiate data exchanges b. they may upload data to servers
46. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. DNS b. SMTP c. POP
UDP
80 (HTTP)
47. What type of network cable is used between a terminal and a console port?
A. Physical b. Data Link
A. Cat5 UTP b. Cat6 UTP
Switch
Rollover cable
48. What is an automated service that matches resource names w/ required IP addresses?
Source and Destination IP address
DNS
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
They must wait until the first hosts finish transfering the media.
49. 3 terms that define the forms of help available within the Cisco IOS
It uses support from the lower layers to distinguish between connections to the service.
A. hot keys b. context-sensitive c. command syntax check
Hub
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
50. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
It reduces unnecessary broadcasts.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Minimal delays in data delivery.