SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
IP is not properly installed
A. DNS b. SMTP c. POP
No collisions will occur on this link.
SMB
2. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
Network
Supports error detection.
Rollover cable
Router(config)# interface FastEthernet 0/1
3. Group of hosts that have identical bit patterns in the high order bits of their addresses
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Network Access
It uses support from the lower layers to distinguish between connections to the service.
Network
4. What are 2 commands used to view a host routing table?
A. DNS b. SMTP c. POP
A. purpose b. geographic location c. ownership
It provides for the exchange of data over a common local media.
A. netstat -r b. route PRINT
5. What event occurs during the 3-way handshake?
Collisions can decrease network performance.
Network address
TCP initializes the sequence numbers for the sessions.
Identify processes or services that are communicating with end devices.
6. What is the role of MTA in handling email?
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Network Layer
7. 3 features of IPv6
It provides interface between applications on either end of the network.
A. larger address space b. data types and classes of service c. authentication and encryption
Hub
Console
8. Given IP 172.16.134.64 and S/M 255.255.255.224 - this IP is an...?
A. router b. firewall
Network address
Minimal delays in data delivery.
Network portion
9. During encapsulation - what happens in the Data Link Layer?
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. performance degradation b. security issues c. host identification
UTP
The physical address is added.
10. 3 functions of the upper data link sublayer in the OSI model
A. Physical b. Data Link
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
RJ-45
11. At which layer of the TCP/IP model does ethernet operate?
A. HTTP b. HTTPS
Host mobility
Network Layer
Network Access
12. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
It provides interface between applications on either end of the network.
It uses lasers as the light source.
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
13. At which layers of the OSI model does ethernet operate?
A. physical layer b. DLL layer
A default gateway (router).
Originate data flow.
A. larger address space b. data types and classes of service c. authentication and encryption
14. Which layer supplies services and allows user interface?
It has expanded adressing capabilities.
Application Layer
A. non-deterministic b. less overhead c. collisions exist
Network Access
15. 2 features that make switches preferable to hubs
Router(config)# interface FastEthernet 0/1
Is used by the server to resolve names.
A. router b. firewall
A. minimizing of collisions b. division into broadcast domains
16. What is the primary function of encapsulating packets into frames?
Show Interfaces
A. non-deterministic b. less overhead c. collisions exist
To facilitate the entry and exit of data on media.
Router
17. What is the purpose of the TCP/IP Network Application Layer?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
Router(config)# hostname Costas
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
Network Media Control
18. 3 primary functions of the data link layer encapsulation
Source and Destination IP address
A. router b. firewall
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. addressing b. error detection c. frame delimiting
19. What connectors are commonly associated w/ Cisco's V.35 serial cables?
A. DB 60 b. Winchester 15-pin c. smart serial
Network portion
It uses support from the lower layers to distinguish between connections to the service.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
20. An admin needs to keep contents private - which access method should he use?
SSH
A. addressing b. error detection c. frame delimiting
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. Physical b. Data Link
21. What correctly describes a MAC address?
Minimal delays in data delivery.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. replace a switch w/ a router b. subnet the new networks
A. larger address space b. data types and classes of service c. authentication and encryption
22. Which IP packet field will prevent endless loops?
A. performance degradation b. security issues c. host identification
Wireless
A. hot keys b. context-sensitive c. command syntax check
Time-to-live (TTL)
23. What do you need to use for an initial configuration on a Cisco router?
A. performance degradation b. security issues c. host identification
Console interface
Network Layer
A. the router will discard the packet b. the router will send a time exceeded message to the source host
24. In a connectionless system - What is correct?
A. router b. firewall
A. application b. presentation c. session d. transmision e. network f. data link g. physical
A. replace a switch w/ a router b. subnet the new networks
Destination is not contacted before a packet is sent.
25. 3 factors that should be considered when implementing Layer 2 protocols
IP is not properly installed
Identify the device that allows local network computers to communicate w/ devices in other networks.
Twisting of the cables
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
26. Which portion of the network layer address does a router use to forward packets?
Static
Transport
A. hot keys b. context-sensitive c. command syntax check
Network portion
27. 3 statements of media acess control
Minimal delays in data delivery.
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
28. What subnet mask will an admin assign to the network address 172.30.1.0 if its possible to have 254 hosts?
Binary ANDing
It provides interface between applications on either end of the network.
255.255.255.0
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
29. If you want to connect 4 hosts in a home network - what would be the best deviced to be used?
A. enable mode b. priviledge executive mode
Switch
A. HTTP b. HTTPS
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
30. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
It uses support from the lower layers to distinguish between connections to the service.
Destination is not contacted before a packet is sent.
Window Size
31. To make a console connection from a comp to a Cisco router - what cable should be used?
Rollover cable
A backbone cable.
A. servers b. routers c. network printers
A. goodput b. throughput c. bandwidth
32. When destination network is not in the routing table - What are 2 actions the router might take?
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Network address
Console interface
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
33. What information is added during encapsulation at OSI Layer 3?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Source and Destination IP address
A. goodput b. throughput c. bandwidth
They must wait until the first hosts finish transfering the media.
34. What can get you to an outside network?
The physical address is added.
UTP
A. purpose b. geographic location c. ownership
A default gateway (router).
35. What do the intermediary devices in the network do?
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Network portion
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
36. Which sublayer of the DLL prepares a signal to be transmitted at the physical layer?
MAC
It uses support from the lower layers to distinguish between connections to the service.
When connecting a host to a switch.
Twisting of the cables
37. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
It uses support from the lower layers to distinguish between connections to the service.
To enable a receiving host to forward the data to the appropriate application.
OTDR
UDP
38. What do end devices do?
Originate data flow.
172.16.192.160
A. router b. firewall
A. perform degradation b. security issues c. host identification
39. What type of routing uses information that is manually entered into the routing table?
Static
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Ctrl + Shift + 6
UDP
40. If there are potential electrical and/or electromagnetic hazards - what type of media is recommended for backbone cabling?
Fiber
Switch
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. non-deterministic b. less overhead c. collisions exist
41. 3 measures of data transfer
RJ-45
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Network Media Control
A. goodput b. throughput c. bandwidth
42. What are 2 features of User Diagram Protocol (UDP)?
A. low overhead b. connectionless
Logical Link Control sublayer
A default gateway (router).
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
43. What is an automated service that matches resource names w/ required IP addresses?
80 (HTTP)
Identify the device that allows local network computers to communicate w/ devices in other networks.
DNS
A. Cat5 UTP b. Cat6 UTP
44. What is a characteristic of a logical point-to-point topology?
The MAC protocol can be very simple.
It has expanded adressing capabilities.
Source and Destination IP address
It reduces unnecessary broadcasts.
45. What is a benefit of a WAN?
It uses support from the lower layers to distinguish between connections to the service.
Rollover cable
Host mobility
A. low overhead b. connectionless
46. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
A. addressing b. error detection c. frame delimiting
They must wait until the first hosts finish transfering the media.
A. copper UTP b. optical fiber
Fiber
47. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
The address of the router that the host will use to 'get to the other side'.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Destination Network Address
48. When do changes take effect in a Cisco router?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
8
As the commands are entered.
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
49. What is a drawback of the CSMA/CD access method?
Application Layer
A. physical layer b. DLL layer
Collisions can decrease network performance.
255.255.255.0
50. What is the purpose of the preamble in an ethernet frame?
As the commands are entered.
The physical address is added.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. application b. presentation c. session d. transmision e. network f. data link g. physical