SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which type of cable is most often associated w/ fiber-optic cable?
A backbone cable.
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Is a layer of specific encapsulation.
8
2. After a routers ends its boot sequence - the admin wants to check the routers config. From the EXEC mode - which commands can the admin use?
Any device whose backoff timer expires first.
A. show startup-config b. show running-config
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
Next-Hop Address
3. What is the role of MTA in handling email?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Any device whose backoff timer expires first.
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
4. What is the purpose of the TCP/IP Network Application Layer?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. flow control b. session establishment c. numbering and sequencing
Network Media Control
DNS
5. What are the advantages of using a client-server model?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. it has centralized administration b. security is easier to enforce
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
6. How does the application layer on a server process multiple client requests for services?
Supports error detection.
Source Port
A. netstat -r b. route PRINT
It uses support from the lower layers to distinguish between connections to the service.
7. Which IP packet field will prevent endless loops?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Time-to-live (TTL)
255.255.255.224
Logical Link Control sublayer
8. What is the proper order of the OSI Layers?
A. next-hop b. metric/interface c. destination network address
Next-Hop Address
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Is a layer of specific encapsulation.
9. To make a console connection from a comp to a Cisco router - what cable should be used?
Rollover cable
Ctrl + Shift + 6
The magnetic field around the adjacent pairs of wire.
A. larger address space b. data types and classes of service c. authentication and encryption
10. What device can check for faults - integrity and performance of media?
OTDR
A. application b. services
Any device whose backoff timer expires first.
Source and Destination IP address
11. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
The magnetic field around the adjacent pairs of wire.
A. non-deterministic b. less overhead c. collisions exist
Next-Hop Address
UDP
12. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
2046
A. addressing b. error detection c. frame delimiting
A. low overhead b. connectionless
Transport
13. After an ethernet collision - which device has priority to transmit data?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
UDP
IP is not properly installed
Any device whose backoff timer expires first.
14. What is the purpose of the preamble in an ethernet frame?
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
OTDR
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
FTP
15. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
255.255.255.224
A. replace a switch w/ a router b. subnet the new networks
It has expanded adressing capabilities.
Binary ANDing
16. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
A. addressing b. error detection c. frame delimiting
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Router(config)# interface FastEthernet 0/1
A. minimizing of collisions b. division into broadcast domains
17. What 2 type of cables would most commonly be used for new runs?
Switch
Network portion
Destination Network Address
A. Cat5 UTP b. Cat6 UTP
18. What type of routing uses information that is manually entered into the routing table?
A. replace a switch w/ a router b. subnet the new networks
Source and Destination IP address
Static
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
19. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
172.16.192.160
Binary ANDing
A. it has centralized administration b. security is easier to enforce
DNS
20. What is the primary reason for developing IPv6?
Resolve IPv4 addresses to MAC addresses.
It has expanded adressing capabilities.
0 to 1023
Network Layer Packet
21. What are 2 protocols for transfering web resources?
A. goodput b. throughput c. bandwidth
172.16.192.160
32 bits
A. HTTP b. HTTPS
22. In business LANs - which connector is used w/ twisted-pair networking cable?
RJ-45
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
It has expanded adressing capabilities.
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
23. 3 terms that define the forms of help available within the Cisco IOS
DNS
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. hot keys b. context-sensitive c. command syntax check
As the commands are entered.
24. What are 2 forms of application layer software?
To prevent the receiver from being overwhelmed by incoming data.
Source and Destination IP address
It provides for the exchange of data over a common local media.
A. application b. services
25. What determines the method of media access control?
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. copper UTP b. optical fiber
Ctrl + Shift + 6
A. media sharing b. logical topology
26. What is a characteristic of a logical point-to-point topology?
Identify processes or services that are communicating with end devices.
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
The MAC protocol can be very simple.
To prevent the receiver from being overwhelmed by incoming data.
27. Which layer supplies services and allows user interface?
A. purpose b. geographic location c. ownership
Application Layer
UDP
Time-to-live (TTL)
28. An admin needs to keep contents private - which access method should he use?
A default gateway (router).
IP is not properly installed
SSH
Router
29. What networking devices are recommended to be assigned static IP addresses?
IP Protocol
Any device whose backoff timer expires first.
A. servers b. routers c. network printers
Router(config)# interface FastEthernet 0/1
30. 2 most commonly used media types in ethernet networks
The magnetic field around the adjacent pairs of wire.
80 (HTTP)
SSH
A. copper UTP b. optical fiber
31. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
Rollover cable
Supports error detection.
A. router b. firewall
A. identifies the communicating applications b. identifies multiple conversations between the hosts
32. 3 statements of media acess control
A. copper UTP b. optical fiber
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
Logical Link Control sublayer
Time-to-live (TTL)
33. What type of network cable is used between a terminal and a console port?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Rollover cable
0 to 1023
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
34. What are 3 common problems w/ large networks?
RJ-45
A. perform degradation b. security issues c. host identification
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Source and Destination IP address
35. Which 2 options represent Layer 4 addressing?
Fiber
A. identifies the communicating applications b. identifies multiple conversations between the hosts
SMB
A. HTTP b. HTTPS
36. 3 protocols that operate in the application layer
A. DNS b. SMTP c. POP
A. minimizing of collisions b. division into broadcast domains
A default gateway (router).
Console
37. When a device is moved from one network to the other...?
Rollover cable
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. not affected by EMI of RFI b. most expensive type of LAN cabling
38. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
Is used by the server to resolve names.
A. flow control b. session establishment c. numbering and sequencing
Fiber
Ctrl + Shift + 6
39. What can you identify when you examine the Network Layer header?
A. performance degradation b. security issues c. host identification
The destination host address.
Console interface
A. show startup-config b. show running-config
40. When a network service fails - which port is most often used to access a router for management purposes?
Source Port
Identify processes or services that are communicating with end devices.
Console
A. DB 60 b. Winchester 15-pin c. smart serial
41. What is an automated service that matches resource names w/ required IP addresses?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
DNS
Network Media Control
Signal loss can be experienced.
42. 2 features that make switches preferable to hubs
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
RJ-45
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. minimizing of collisions b. division into broadcast domains
43. 3 facts about the network portion of an IPv4 address
Transport
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
To enable a receiving host to forward the data to the appropriate application.
A. DB 60 b. Winchester 15-pin c. smart serial
44. What are 3 properties of contention-based media access for a shared media?
Window Size
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. non-deterministic b. less overhead c. collisions exist
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
45. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
Static
Window Size
Resolve IPv4 addresses to MAC addresses.
255.255.255.224
46. What application layer protocol is used to support file transfers between client and server?
0 to 1023
FTP
Identify the device that allows local network computers to communicate w/ devices in other networks.
The destination host address.
47. What are 2 commands used to view a host routing table?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. netstat -r b. route PRINT
Source and Destination Ports
255.255.255.0
48. What command can be used to determine if the router has experienced any input or output errors?
Rollover cable
Show Interfaces
It has expanded adressing capabilities.
Application Layer
49. What do the intermediary devices in the network do?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
172.16.192.160
50. What makes fiber preferable to copper for interconnecting buildings?
Rollover cable
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
The MAC protocol can be very simple.