SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What 2 type of cables would most commonly be used for new runs?
A. show startup-config b. show running-config
A physical topology.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. Cat5 UTP b. Cat6 UTP
2. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Is used by the server to resolve names.
A random delay helps prevent the stations from experiencing another collision during transmission.
3. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
The MAC protocol can be very simple.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. non-deterministic b. less overhead c. collisions exist
Fiber
4. What can get you to an outside network?
It provides interface between applications on either end of the network.
A default gateway (router).
To facilitate the entry and exit of data on media.
A. Physical b. Data Link
5. What is a characteristic of a logical point-to-point topology?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
The MAC protocol can be very simple.
A. decentralized resources b. resource sharing w/o a dedicated server
6. What is the proper order of the OSI Layers?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. application b. presentation c. session d. transmision e. network f. data link g. physical
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. media sharing b. logical topology
7. During a TCP session - if packets arrive out of order - what will happen?
Router(config)# interface FastEthernet 0/1
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
OTDR
The packets will be delivered and reassembled at destination.
8. What is an effect of improperly applying a network cable connector?
Router(config)# hostname Costas
Signal loss can be experienced.
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. performance degradation b. security issues c. host identification
9. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
A. physical layer b. DLL layer
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
OTDR
Fiber
10. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
255.255.255.224
Window Size
A. flow control b. session establishment c. numbering and sequencing
80 (HTTP)
11. What is a benefit of a WAN?
Any device whose backoff timer expires first.
Host mobility
Network Media Control
A. larger address space b. data types and classes of service c. authentication and encryption
12. What is the primary function of encapsulating packets into frames?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. media sharing b. logical topology
To facilitate the entry and exit of data on media.
Show Interfaces
13. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Transport
Physical
UDP
A. replace a switch w/ a router b. subnet the new networks
14. 3 common problems w/ a large network
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
The destination host address.
A. performance degradation b. security issues c. host identification
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
15. 3 facts about the network portion of an IPv4 address
OTDR
The MAC protocol can be very simple.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
16. What are 3 properties of contention-based media access for a shared media?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Rollover cable
It provides interface between applications on either end of the network.
A. non-deterministic b. less overhead c. collisions exist
17. How does the application layer on a server process multiple client requests for services?
Network address
It uses support from the lower layers to distinguish between connections to the service.
It provides interface between applications on either end of the network.
They must wait until the first hosts finish transfering the media.
18. At which layers of the OSI model does ethernet operate?
A. performance degradation b. security issues c. host identification
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
The address of the router that the host will use to 'get to the other side'.
A. physical layer b. DLL layer
19. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
Network portion
Router(config)# hostname Costas
Transport
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
20. What is the primary reason for developing IPv6?
It has expanded adressing capabilities.
UDP
A. physical layer b. DLL layer
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
21. In business LANs - which connector is used w/ twisted-pair networking cable?
Ctrl + Shift + 6
Network Access
Destination is not contacted before a packet is sent.
RJ-45
22. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
The physical address is added.
Router(config)# interface FastEthernet 0/1
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
TCP initializes the sequence numbers for the sessions.
23. What are 2 email components used to forward mail between servers?
A. MTA b. SMTP
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. they initiate data exchanges b. they may upload data to servers
24. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
The magnetic field around the adjacent pairs of wire.
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
8
A. application b. presentation c. session d. transmision e. network f. data link g. physical
25. What is the primary rope of the physical layer in transmitting data?
The address of the router that the host will use to 'get to the other side'.
Create signals that represent the bits in each frame for the media.
Is used by the server to resolve names.
It provides interface between applications on either end of the network.
26. Important characteristic of UDP
Minimal delays in data delivery.
Flash
A. performance degradation b. security issues c. host identification
Hosts return to listen-before-transmit mode.
27. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
Destination is not contacted before a packet is sent.
Collisions can decrease network performance.
UDP
IP Protocol
28. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
255.255.255.224
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Router(config)# hostname Costas
A. purpose b. geographic location c. ownership
29. What do end devices do?
Show Interfaces
It provides for the exchange of data over a common local media.
Originate data flow.
Minimal delays in data delivery.
30. What layer encapsulates segments into packets?
A. hot keys b. context-sensitive c. command syntax check
Network Layer
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. replace a switch w/ a router b. subnet the new networks
31. If you have a small network w/ 3 computers...
A. perform degradation b. security issues c. host identification
A. router b. firewall
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
32. 3 statements about routes and their use
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. it has centralized administration b. security is easier to enforce
A. Cat5 UTP b. Cat6 UTP
33. On a ethernet segment - why do hosts that experience a collision use a random delay before attempting to transmit?
It does not support encryption.
Console
A random delay helps prevent the stations from experiencing another collision during transmission.
A. Cat5 UTP b. Cat6 UTP
34. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Hosts return to listen-before-transmit mode.
Source and Destination Ports
Switch
35. 3 properties of peer-2-peer applications
Flash
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. decentralized resources b. resource sharing w/o a dedicated server
36. 3 measures of data transfer
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. hot keys b. context-sensitive c. command syntax check
A. goodput b. throughput c. bandwidth
Router(config)# interface FastEthernet 0/1
37. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
Physical
Supports error detection.
Identify processes or services that are communicating with end devices.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
38. Which type of cable is most often associated w/ fiber-optic cable?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A backbone cable.
0 to 1023
A. netstat -r b. route PRINT
39. At which layer of the TCP/IP model does ethernet operate?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. netstat -r b. route PRINT
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Network Access
40. What are 2 common characteristics associated w/ dynamic routing protocols?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Network Layer Packet
A. servers b. routers c. network printers
DNS
41. There are too many broadcasts on switches - what can be done?
A. copper UTP b. optical fiber
Hosts return to listen-before-transmit mode.
FTP
A. replace a switch w/ a router b. subnet the new networks
42. What does the IEEE 802.2 standard represent in Ethernet technologies?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Logical Link Control sublayer
Binary ANDing
Destination is not contacted before a packet is sent.
43. 3 functions of the upper data link sublayer in the OSI model
Create signals that represent the bits in each frame for the media.
To facilitate the entry and exit of data on media.
Network Layer
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
44. Which combination of keys can be used to interrupt a ping or traceroute process?
Network Access
Ctrl + Shift + 6
A. Cat5 UTP b. Cat6 UTP
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
45. What is a characteristic of a single-mode fiber-optic cable?
It uses lasers as the light source.
A. DB 60 b. Winchester 15-pin c. smart serial
They must wait until the first hosts finish transfering the media.
Switch
46. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
They must wait until the first hosts finish transfering the media.
Logical Link Control sublayer
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
OTDR
47. 3 features that allow TCP to realibly and accurately track the transmission of data
A. servers b. routers c. network printers
Minimal delays in data delivery.
Identify processes or services that are communicating with end devices.
A. flow control b. session establishment c. numbering and sequencing
48. What information is added during encapsulation at OSI Layer 3?
Source and Destination IP address
The magnetic field around the adjacent pairs of wire.
Application Layer
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
49. What application layer protocol is used to support file transfers between client and server?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
The packets will be delivered and reassembled at destination.
FTP
Rollover cable
50. What is a protocol that provides connectionless network layer services?
IP Protocol
TCP initializes the sequence numbers for the sessions.
Minimal delays in data delivery.
A. it has centralized administration b. security is easier to enforce