SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a disadvantage of Telnet?
A. hot keys b. context-sensitive c. command syntax check
Network Layer
It does not support encryption.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
2. Why is flow control used for TCP data transfer?
A. non-deterministic b. less overhead c. collisions exist
To prevent the receiver from being overwhelmed by incoming data.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
3. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
They must wait until the first hosts finish transfering the media.
As the commands are entered.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Next-Hop Address
4. 3 common problems w/ a large network
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. performance degradation b. security issues c. host identification
It has expanded adressing capabilities.
Identify processes or services that are communicating with end devices.
5. What is the purpose of resource records in DNS?
Is used by the server to resolve names.
Destination Network Address
A. it has centralized administration b. security is easier to enforce
Wireless
6. What are 2 commands used to view a host routing table?
A. netstat -r b. route PRINT
Hub
A default gateway (router).
The destination host address.
7. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
The physical address is added.
UTP
0 to 1023
Network Layer Packet
8. What application layer protocol is used to support file transfers between client and server?
Source and Destination IP address
The address of the router that the host will use to 'get to the other side'.
To facilitate the entry and exit of data on media.
FTP
9. Which characteristics describe fiber optic cable?
Rollover cable
A. minimizing of collisions b. division into broadcast domains
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Source Port
10. An admin needs to keep contents private - which access method should he use?
A. show startup-config b. show running-config
It uses support from the lower layers to distinguish between connections to the service.
Identify the device that allows local network computers to communicate w/ devices in other networks.
SSH
11. What connectors are commonly associated w/ Cisco's V.35 serial cables?
A. goodput b. throughput c. bandwidth
A. DB 60 b. Winchester 15-pin c. smart serial
Supports error detection.
Rollover cable
12. When a device is moved from one network to the other...?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. physical layer b. DLL layer
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Next-Hop Address
13. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
A backbone cable.
A. perform degradation b. security issues c. host identification
Window Size
To prevent the receiver from being overwhelmed by incoming data.
14. What are 2 forms of application layer software?
Network Layer
A. application b. services
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. MTA b. SMTP
15. 2 most commonly used media types in ethernet networks
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
It has expanded adressing capabilities.
A. copper UTP b. optical fiber
It provides for the exchange of data over a common local media.
16. Statements that describe LAN
A. media sharing b. logical topology
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. next-hop b. metric/interface c. destination network address
A default gateway (router).
17. What can be a problem that is reduced by adding end-to-end addressing?
Rollover cable
A. servers b. routers c. network printers
It reduces unnecessary broadcasts.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
18. What does the IEEE 802.2 standard represent in Ethernet technologies?
A. show startup-config b. show running-config
Logical Link Control sublayer
SSH
A. router b. firewall
19. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Any device whose backoff timer expires first.
Ctrl + Shift + 6
20. 3 characteristics of valid Ethernet Layer 2 addresses
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
The physical address is added.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. enable mode b. priviledge executive mode
21. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
Create signals that represent the bits in each frame for the media.
The address of the router that the host will use to 'get to the other side'.
Transport
A. show startup-config b. show running-config
22. After an ethernet collision - which device has priority to transmit data?
Application Layer
Router
Any device whose backoff timer expires first.
Switch
23. What is the role of the OSI Application Layer?
A. show startup-config b. show running-config
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
It provides interface between applications on either end of the network.
Is used by the server to resolve names.
24. What are 2 features of User Diagram Protocol (UDP)?
255.255.255.0
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. low overhead b. connectionless
25. What type of network cable is used between a terminal and a console port?
Rollover cable
A. decentralized resources b. resource sharing w/o a dedicated server
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
A. DNS b. SMTP c. POP
26. During a TCP session - if packets arrive out of order - what will happen?
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Source and Destination Ports
Minimal delays in data delivery.
The packets will be delivered and reassembled at destination.
27. Group of hosts that have identical bit patterns in the high order bits of their addresses
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Network
A. goodput b. throughput c. bandwidth
SSH
28. What do the intermediary devices in the network do?
Show Interfaces
Time-to-live (TTL)
Logical Link Control sublayer
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
29. What information is added during encapsulation at OSI Layer 3?
Console interface
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Source and Destination IP address
Is used by the server to resolve names.
30. When a network service fails - which port is most often used to access a router for management purposes?
255.255.255.0
Console
Supports error detection.
It reduces unnecessary broadcasts.
31. What is dinamically selected by the source host when forwarding data?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Source Port
A. low overhead b. connectionless
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
32. What command is used to change the default name to 'Costas'?
Transport
Router(config)# hostname Costas
It uses lasers as the light source.
A. physical layer b. DLL layer
33. What kind of problems are caused by excessive broadcast traffic on network segments?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Collisions can decrease network performance.
34. 3 measures of data transfer
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. DNS b. SMTP c. POP
RJ-45
A. goodput b. throughput c. bandwidth
35. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
It provides interface between applications on either end of the network.
A. Physical b. Data Link
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Host A
36. What statements describe the logical token-passing topology?
Hub
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
2046
Window Size
37. What correctly describes a MAC address?
OTDR
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
The physical address is added.
Twisting of the cables
38. What are 2 common characteristics associated w/ dynamic routing protocols?
The magnetic field around the adjacent pairs of wire.
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Console interface
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
39. To make a console connection from a comp to a Cisco router - what cable should be used?
It does not support encryption.
A. HTTP b. HTTPS
Rollover cable
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
40. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
172.16.192.160
Fiber
Collisions can decrease network performance.
A. DB 60 b. Winchester 15-pin c. smart serial
41. What are the advantages of using a client-server model?
A. it has centralized administration b. security is easier to enforce
A. performance degradation b. security issues c. host identification
Flash
A. addressing b. error detection c. frame delimiting
42. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A random delay helps prevent the stations from experiencing another collision during transmission.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Binary ANDing
43. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
The address of the router that the host will use to 'get to the other side'.
Source and Destination Ports
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
44. 3 facts about the network portion of an IPv4 address
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
8
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
The physical address is added.
45. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
Logical Link Control sublayer
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Rollover cable
0 to 1023
46. 2 functions of encapsulation
A. physical layer b. DLL layer
Transport
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A default gateway (router).
47. How many host addresses can be assigned to a subnetwork when using the 130.68.0.0 network address w/ a subnet mask of 255.255.248.0?
2046
The packets will be delivered and reassembled at destination.
SMB
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
48. Which portion of the network layer address does a router use to forward packets?
Network portion
A. show startup-config b. show running-config
Any device whose backoff timer expires first.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
49. What is the primary purpose of ARP?
DNS
Static
A. netstat -r b. route PRINT
Resolve IPv4 addresses to MAC addresses.
50. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
A. application b. services
A. netstat -r b. route PRINT
IP is not properly installed
Application Layer