SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are 2 layers of the OSI model that have the same functions as the TCP/IP Network Application Layer?
Is a layer of specific encapsulation.
A. Physical b. Data Link
A random delay helps prevent the stations from experiencing another collision during transmission.
Switch
2. What would be the response displayed after pinging 127.0.0.1 and there is a 0 packet transmission?
SMB
172.16.192.160
IP is not properly installed
Router(config)# hostname Costas
3. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
Host mobility
They must wait until the first hosts finish transfering the media.
Flash
A. addressing b. error detection c. frame delimiting
4. 3 facts about the network portion of an IPv4 address
It uses support from the lower layers to distinguish between connections to the service.
As the commands are entered.
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
5. Group of hosts that have identical bit patterns in the high order bits of their addresses
Network
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Ctrl + Shift + 6
A. Cat5 UTP b. Cat6 UTP
6. What correctly describes a MAC address?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. HTTP b. HTTPS
A. router b. firewall
Static
7. What are 3 properties of contention-based media access for a shared media?
A. non-deterministic b. less overhead c. collisions exist
A. Physical b. Data Link
A. goodput b. throughput c. bandwidth
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
8. How many bits make up an IPv4 address?
32 bits
Collisions can decrease network performance.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Logical Link Control sublayer
9. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
255.255.255.0
UDP
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
10. What do you need to use for an initial configuration on a Cisco router?
It reduces unnecessary broadcasts.
Console interface
A. servers b. routers c. network printers
A. larger address space b. data types and classes of service c. authentication and encryption
11. What does the IEEE 802.2 standard represent in Ethernet technologies?
Application Layer
A. servers b. routers c. network printers
Logical Link Control sublayer
It uses lasers as the light source.
12. What is the purpose of the TCP/IP Network Application Layer?
It has expanded adressing capabilities.
Network Media Control
Console interface
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
13. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Physical
Wireless
Hosts return to listen-before-transmit mode.
To prevent the receiver from being overwhelmed by incoming data.
14. Which IP packet field will prevent endless loops?
255.255.255.0
SMB
32 bits
Time-to-live (TTL)
15. If host A's DG is 10.0.0.1 and host B's DG is 10.0.0.2 - when the router's IP address is 10.0.0.1. Which one will go through?
Host A
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
IP is not properly installed
Ctrl + Shift + 6
16. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
A. next-hop b. metric/interface c. destination network address
Network Layer
SMB
Switch
17. 3 statements about routes and their use
Window Size
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. hot keys b. context-sensitive c. command syntax check
A. copper UTP b. optical fiber
18. When destination network is not in the routing table - What are 2 actions the router might take?
172.16.192.160
The physical address is added.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
19. Default Gateway is incorrect on the host - What is the impact on the communications?
Time-to-live (TTL)
Identify processes or services that are communicating with end devices.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. performance degradation b. security issues c. host identification
20. During encapsulation - what happens in the Data Link Layer?
Network Media Control
The physical address is added.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. non-deterministic b. less overhead c. collisions exist
21. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
Hub
Originate data flow.
Console interface
A. router b. firewall
22. What are 2 common characteristics associated w/ dynamic routing protocols?
Router
Hub
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Network Media Control
23. Intermediary devices used to implement security between networks
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. router b. firewall
Create signals that represent the bits in each frame for the media.
24. What are the advantages of using a client-server model?
Network Access
A. it has centralized administration b. security is easier to enforce
A. Cat5 UTP b. Cat6 UTP
When connecting a host to a switch.
25. 3 functions of the upper data link sublayer in the OSI model
When connecting a host to a switch.
Source and Destination IP address
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
26. Which combination of keys can be used to interrupt a ping or traceroute process?
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
It has expanded adressing capabilities.
Ctrl + Shift + 6
Router(config)# interface FastEthernet 0/1
27. What connectors are commonly associated w/ Cisco's V.35 serial cables?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Static
It provides interface between applications on either end of the network.
A. DB 60 b. Winchester 15-pin c. smart serial
28. 3 terms that define the forms of help available within the Cisco IOS
Network Layer
0 to 1023
Source Port
A. hot keys b. context-sensitive c. command syntax check
29. What event occurs during the 3-way handshake?
RJ-45
TCP initializes the sequence numbers for the sessions.
A. flow control b. session establishment c. numbering and sequencing
A. show startup-config b. show running-config
30. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
A. application b. services
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Physical
It reduces unnecessary broadcasts.
31. At which layers of the OSI model does ethernet operate?
A. physical layer b. DLL layer
A. purpose b. geographic location c. ownership
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. minimizing of collisions b. division into broadcast domains
32. What is an effect of improperly applying a network cable connector?
The packets will be delivered and reassembled at destination.
A. enable mode b. priviledge executive mode
The destination host address.
Signal loss can be experienced.
33. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
The packets will be delivered and reassembled at destination.
Transport
Fiber
The magnetic field around the adjacent pairs of wire.
34. In business LANs - which connector is used w/ twisted-pair networking cable?
RJ-45
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. perform degradation b. security issues c. host identification
It uses lasers as the light source.
35. When do changes take effect in a Cisco router?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Network Layer Packet
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
As the commands are entered.
36. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. performance degradation b. security issues c. host identification
SMB
37. If you have a full-duplex operational network - what can happen?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
Ctrl + Shift + 6
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
No collisions will occur on this link.
38. What is the function of the DLL?
Network portion
No collisions will occur on this link.
It provides for the exchange of data over a common local media.
A. show startup-config b. show running-config
39. Which portion of the network layer address does a router use to forward packets?
Network portion
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
A. MTA b. SMTP
40. What is PDU?
No collisions will occur on this link.
Is a layer of specific encapsulation.
A random delay helps prevent the stations from experiencing another collision during transmission.
A. hot keys b. context-sensitive c. command syntax check
41. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Binary ANDing
A. low overhead b. connectionless
SSH
42. What type of routing uses information that is manually entered into the routing table?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
UTP
Network address
Static
43. After a browser makes a request to a web server in the standard port - what will be the port number in the TCP header?
80 (HTTP)
Hosts return to listen-before-transmit mode.
A. low overhead b. connectionless
Network portion
44. Why are port numbers included in the TCP header of a segment?
A. minimizing of collisions b. division into broadcast domains
Originate data flow.
The magnetic field around the adjacent pairs of wire.
To enable a receiving host to forward the data to the appropriate application.
45. 3 factors that should be considered when implementing Layer 2 protocols
Is a layer of specific encapsulation.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Ctrl + Shift + 6
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
46. What is the primary rope of the physical layer in transmitting data?
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Create signals that represent the bits in each frame for the media.
A. Physical b. Data Link
IP Protocol
47. What are 3 common problems w/ large networks?
A. perform degradation b. security issues c. host identification
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
Router
It provides for the exchange of data over a common local media.
48. 2 characteristics of clients in data networks
SMB
Twisting of the cables
A. goodput b. throughput c. bandwidth
A. they initiate data exchanges b. they may upload data to servers
49. What do end devices do?
DNS
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
It provides interface between applications on either end of the network.
Originate data flow.
50. What type of network cable is used between a terminal and a console port?
To enable a receiving host to forward the data to the appropriate application.
Rollover cable
Hosts return to listen-before-transmit mode.
FTP