SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the purpose of the TCP/IP Network Application Layer?
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Next-Hop Address
Network Media Control
Network
2. What are 2 email components used to forward mail between servers?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. HTTP b. HTTPS
The destination host address.
A. MTA b. SMTP
3. When a device is moved from one network to the other...?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. router b. firewall
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
4. How many bits make up an IPv4 address?
A. hot keys b. context-sensitive c. command syntax check
A default gateway (router).
32 bits
Network address
5. 2 functions of encapsulation
A backbone cable.
Switch
The physical address is added.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
6. What is the role of MTA in handling email?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Flash
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
7. During encapsulation - what happens in the Data Link Layer?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Network Access
The physical address is added.
It uses lasers as the light source.
8. At which layer of the TCP/IP model does ethernet operate?
Source Port
No collisions will occur on this link.
Network Access
Time-to-live (TTL)
9. What is a characteristic of a logical point-to-point topology?
Binary ANDing
The MAC protocol can be very simple.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Originate data flow.
10. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Hosts return to listen-before-transmit mode.
A. decentralized resources b. resource sharing w/o a dedicated server
UTP
Ctrl + Shift + 6
11. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
The address of the router that the host will use to 'get to the other side'.
Window Size
A. next-hop b. metric/interface c. destination network address
TCP initializes the sequence numbers for the sessions.
12. What is the primary function of encapsulating packets into frames?
RJ-45
255.255.255.224
To facilitate the entry and exit of data on media.
The destination host address.
13. What makes fiber preferable to copper for interconnecting buildings?
32 bits
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Fiber
A. show startup-config b. show running-config
14. What are 3 pieces of info about a route contained in a routing table?
Resolve IPv4 addresses to MAC addresses.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. next-hop b. metric/interface c. destination network address
Router
15. When a network service fails - which port is most often used to access a router for management purposes?
A. larger address space b. data types and classes of service c. authentication and encryption
A. it has centralized administration b. security is easier to enforce
It does not support encryption.
Console
16. What can be a problem that is reduced by adding end-to-end addressing?
Rollover cable
8
It reduces unnecessary broadcasts.
A default gateway (router).
17. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
Source and Destination IP address
The packets will be delivered and reassembled at destination.
Transport
Any device whose backoff timer expires first.
18. To make a console connection from a comp to a Cisco router - what cable should be used?
Rollover cable
TCP initializes the sequence numbers for the sessions.
Signal loss can be experienced.
OTDR
19. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Rollover cable
A. DB 60 b. Winchester 15-pin c. smart serial
Physical
Static
20. If there is a graphic representation of a company network wiring and equipment - What is this called?
A physical topology.
Host mobility
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Signal loss can be experienced.
21. 3 measures of data transfer
A. goodput b. throughput c. bandwidth
Show Interfaces
A backbone cable.
A. physical layer b. DLL layer
22. When is a straight-through cable used in a network?
Signal loss can be experienced.
IP is not properly installed
Rollover cable
When connecting a host to a switch.
23. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
A. next-hop b. metric/interface c. destination network address
Destination is not contacted before a packet is sent.
80 (HTTP)
A. non-deterministic b. less overhead c. collisions exist
24. What networking devices are recommended to be assigned static IP addresses?
Network portion
The packets will be delivered and reassembled at destination.
A. servers b. routers c. network printers
32 bits
25. 2 characteristics of peer-2-peer
As the commands are entered.
Window Size
UDP
A. decentralized resources b. resource sharing w/o a dedicated server
26. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
The magnetic field around the adjacent pairs of wire.
172.16.192.160
Originate data flow.
A. it has centralized administration b. security is easier to enforce
27. Why is flow control used for TCP data transfer?
Binary ANDing
To prevent the receiver from being overwhelmed by incoming data.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
FTP
28. What 2 type of cables would most commonly be used for new runs?
SMB
A. enable mode b. priviledge executive mode
255.255.255.0
A. Cat5 UTP b. Cat6 UTP
29. Which layer supplies services and allows user interface?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. Cat5 UTP b. Cat6 UTP
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Application Layer
30. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Logical Link Control sublayer
A random delay helps prevent the stations from experiencing another collision during transmission.
Network Layer Packet
31. Intermediary devices used to implement security between networks
255.255.255.0
Switch
A. router b. firewall
RJ-45
32. What can get you to an outside network?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Collisions can decrease network performance.
A default gateway (router).
A. purpose b. geographic location c. ownership
33. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
SMB
Physical
It uses lasers as the light source.
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
34. What correctly describes a MAC address?
8
Binary ANDing
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. identifies the communicating applications b. identifies multiple conversations between the hosts
35. At which layers of the OSI model does ethernet operate?
It uses lasers as the light source.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. physical layer b. DLL layer
TCP initializes the sequence numbers for the sessions.
36. What command can be used to determine if the router has experienced any input or output errors?
Minimal delays in data delivery.
Show Interfaces
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
255.255.255.0
37. What are 2 features of User Diagram Protocol (UDP)?
Originate data flow.
A. low overhead b. connectionless
Host A
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
38. 3 terms that define the forms of help available within the Cisco IOS
A. enable mode b. priviledge executive mode
Network portion
A. hot keys b. context-sensitive c. command syntax check
The address of the router that the host will use to 'get to the other side'.
39. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Destination Network Address
255.255.255.0
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Identify processes or services that are communicating with end devices.
40. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
It uses support from the lower layers to distinguish between connections to the service.
The MAC protocol can be very simple.
0 to 1023
Create signals that represent the bits in each frame for the media.
41. What are 2 common characteristics associated w/ dynamic routing protocols?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. application b. services
A. perform degradation b. security issues c. host identification
UTP
42. On a ethernet segment - why do hosts that experience a collision use a random delay before attempting to transmit?
IP is not properly installed
A random delay helps prevent the stations from experiencing another collision during transmission.
SMB
Network Media Control
43. What determines the method of media access control?
A. it has centralized administration b. security is easier to enforce
Twisting of the cables
Destination is not contacted before a packet is sent.
A. media sharing b. logical topology
44. What causes crosstalk within cable pairs when using UTP?
TCP initializes the sequence numbers for the sessions.
Identify the device that allows local network computers to communicate w/ devices in other networks.
The magnetic field around the adjacent pairs of wire.
Ctrl + Shift + 6
45. What statements describe the logical token-passing topology?
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. performance degradation b. security issues c. host identification
46. 3 common problems w/ a large network
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. performance degradation b. security issues c. host identification
Time-to-live (TTL)
A. MTA b. SMTP
47. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Host A
255.255.255.0
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
48. 3 factors that should be considered when implementing Layer 2 protocols
A. decentralized resources b. resource sharing w/o a dedicated server
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. non-deterministic b. less overhead c. collisions exist
49. What are 2 protocols for transfering web resources?
Router(config)# interface FastEthernet 0/1
A. HTTP b. HTTPS
To facilitate the entry and exit of data on media.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
50. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
A. flow control b. session establishment c. numbering and sequencing
UTP
Network Media Control
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs