SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Group of hosts that have identical bit patterns in the high order bits of their addresses
Network
A. replace a switch w/ a router b. subnet the new networks
A. perform degradation b. security issues c. host identification
A. HTTP b. HTTPS
2. In business LANs - which connector is used w/ twisted-pair networking cable?
Is a layer of specific encapsulation.
SSH
Host A
RJ-45
3. What connectors are commonly associated w/ Cisco's V.35 serial cables?
Time-to-live (TTL)
A. DB 60 b. Winchester 15-pin c. smart serial
Source Port
Network portion
4. What type of network cable is used between a terminal and a console port?
The destination host address.
A. netstat -r b. route PRINT
Window Size
Rollover cable
5. What is the primary rope of the physical layer in transmitting data?
Create signals that represent the bits in each frame for the media.
A. decentralized resources b. resource sharing w/o a dedicated server
The address of the router that the host will use to 'get to the other side'.
When connecting a host to a switch.
6. What are 2 protocols for transfering web resources?
As the commands are entered.
Ctrl + Shift + 6
A. HTTP b. HTTPS
Application Layer
7. What device can check for faults - integrity and performance of media?
Static
OTDR
A. larger address space b. data types and classes of service c. authentication and encryption
172.16.192.160
8. Why is flow control used for TCP data transfer?
To prevent the receiver from being overwhelmed by incoming data.
A. flow control b. session establishment c. numbering and sequencing
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
8
9. Which combination of keys can be used to interrupt a ping or traceroute process?
Ctrl + Shift + 6
Originate data flow.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
It provides interface between applications on either end of the network.
10. What is a disadvantage of Telnet?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
It does not support encryption.
A. enable mode b. priviledge executive mode
Binary ANDing
11. What command is used to change the default name to 'Costas'?
A. next-hop b. metric/interface c. destination network address
Router(config)# hostname Costas
Router(config)# interface FastEthernet 0/1
It provides interface between applications on either end of the network.
12. What makes fiber preferable to copper for interconnecting buildings?
Switch
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. hot keys b. context-sensitive c. command syntax check
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
13. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Hosts return to listen-before-transmit mode.
Rollover cable
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
It provides for the exchange of data over a common local media.
14. 2 most commonly used media types in ethernet networks
A. router b. firewall
A. copper UTP b. optical fiber
Is a layer of specific encapsulation.
A. addressing b. error detection c. frame delimiting
15. What describes the purpose of default route?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. DNS b. SMTP c. POP
Application Layer
Source Port
16. What is a protocol that provides connectionless network layer services?
A. purpose b. geographic location c. ownership
8
IP Protocol
Source Port
17. What command can be used to determine if the router has experienced any input or output errors?
A. HTTP b. HTTPS
Show Interfaces
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Supports error detection.
18. What do end devices do?
Originate data flow.
It reduces unnecessary broadcasts.
Show Interfaces
Window Size
19. 3 primary functions of the data link layer encapsulation
IP is not properly installed
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. addressing b. error detection c. frame delimiting
Console interface
20. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
Create signals that represent the bits in each frame for the media.
Ctrl + Shift + 6
Window Size
Supports error detection.
21. What information is added during encapsulation at OSI Layer 3?
Source and Destination IP address
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
To prevent the receiver from being overwhelmed by incoming data.
22. When is a straight-through cable used in a network?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Source Port
When connecting a host to a switch.
23. When destination network is not in the routing table - What are 2 actions the router might take?
Wireless
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Transport
Resolve IPv4 addresses to MAC addresses.
24. Intermediary devices used to implement security between networks
Is used by the server to resolve names.
A. router b. firewall
Flash
8
25. If you have an Ethernet Frame w/ a Header - Data and a Trailer. It is a...?
Network Layer Packet
A. replace a switch w/ a router b. subnet the new networks
8
Logical Link Control sublayer
26. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
SMB
Rollover cable
Router(config)# hostname Costas
Supports error detection.
27. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
They must wait until the first hosts finish transfering the media.
The magnetic field around the adjacent pairs of wire.
28. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
Network Access
SMB
A. show startup-config b. show running-config
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
29. What are 2 commands used to view a host routing table?
A. netstat -r b. route PRINT
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. perform degradation b. security issues c. host identification
Router(config)# interface FastEthernet 0/1
30. 3 statements of media acess control
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
To prevent the receiver from being overwhelmed by incoming data.
Wireless
Hosts return to listen-before-transmit mode.
31. What kind of problems are caused by excessive broadcast traffic on network segments?
Identify processes or services that are communicating with end devices.
Destination is not contacted before a packet is sent.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
The destination host address.
32. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
Any device whose backoff timer expires first.
A. Physical b. Data Link
Network Layer Packet
A. servers b. routers c. network printers
33. What is dinamically selected by the source host when forwarding data?
A. low overhead b. connectionless
Source Port
Hub
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
34. Which layer supplies services and allows user interface?
Application Layer
UDP
The destination host address.
Hosts return to listen-before-transmit mode.
35. What is the role of MTA in handling email?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Create signals that represent the bits in each frame for the media.
36. Important characteristic of UDP
A. application b. services
Network Layer
SSH
Minimal delays in data delivery.
37. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
MAC
It provides interface between applications on either end of the network.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Logical Link Control sublayer
38. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
255.255.255.0
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
The packets will be delivered and reassembled at destination.
A. router b. firewall
39. If you have a full-duplex operational network - what can happen?
No collisions will occur on this link.
DNS
A. Cat5 UTP b. Cat6 UTP
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
40. 2 features that make switches preferable to hubs
RJ-45
Binary ANDing
A. MTA b. SMTP
A. minimizing of collisions b. division into broadcast domains
41. If the router says: 'Switch-East4#' What identifies the CLI mode represented?
IP is not properly installed
A. enable mode b. priviledge executive mode
The address of the router that the host will use to 'get to the other side'.
Rollover cable
42. What is a drawback of the CSMA/CD access method?
A. perform degradation b. security issues c. host identification
Identify processes or services that are communicating with end devices.
Collisions can decrease network performance.
2046
43. What type of routing uses information that is manually entered into the routing table?
Static
A. low overhead b. connectionless
It uses lasers as the light source.
Logical Link Control sublayer
44. What is the primary purpose of Layer 4?
A. application b. services
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Identify processes or services that are communicating with end devices.
Router
45. How does the application layer on a server process multiple client requests for services?
It uses support from the lower layers to distinguish between connections to the service.
A. decentralized resources b. resource sharing w/o a dedicated server
Source and Destination IP address
It reduces unnecessary broadcasts.
46. Where is the IOS file stored at?
Flash
A backbone cable.
A. DNS b. SMTP c. POP
IP Protocol
47. What is a characteristic of a logical point-to-point topology?
255.255.255.0
The MAC protocol can be very simple.
DNS
A backbone cable.
48. 3 terms that define the forms of help available within the Cisco IOS
MAC
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. hot keys b. context-sensitive c. command syntax check
49. What correctly describes a MAC address?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
255.255.255.224
A. low overhead b. connectionless
50. What method of signal transmission uses radio waves to carry signals?
Wireless
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. Cat5 UTP b. Cat6 UTP
Next-Hop Address