SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What event occurs during the 3-way handshake?
TCP initializes the sequence numbers for the sessions.
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Destination is not contacted before a packet is sent.
It has expanded adressing capabilities.
2. 3 primary functions of the data link layer encapsulation
A. addressing b. error detection c. frame delimiting
A. HTTP b. HTTPS
Source and Destination IP address
255.255.255.0
3. 3 properties of peer-2-peer applications
A. show startup-config b. show running-config
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
UDP
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
4. If you have a PC - 3 routers and a Laptop... How many unique CRC calculation will take place as traffic routes from the PC to the Laptop?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. DB 60 b. Winchester 15-pin c. smart serial
Host mobility
8
5. What process routers use to determine the subnet network address w/ an IP address and a subnet mask?
The magnetic field around the adjacent pairs of wire.
The address of the router that the host will use to 'get to the other side'.
172.16.192.160
Binary ANDing
6. 3 factors that should be considered when implementing Layer 2 protocols
A. not affected by EMI of RFI b. most expensive type of LAN cabling
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
A. identifies the communicating applications b. identifies multiple conversations between the hosts
It provides interface between applications on either end of the network.
7. Why is flow control used for TCP data transfer?
Network Media Control
To prevent the receiver from being overwhelmed by incoming data.
Network portion
Source and Destination IP address
8. Which device is used to create or divide broadcast domains?
8
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Rollover cable
Router
9. Which OSI model layer is responsible for regulating the flow of information from source to destination - reliably and accurately?
A. replace a switch w/ a router b. subnet the new networks
Twisting of the cables
Transport
Network portion
10. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Hosts return to listen-before-transmit mode.
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Rollover cable
11. Which 2 options represent Layer 4 addressing?
Host A
Network address
A. identifies the communicating applications b. identifies multiple conversations between the hosts
It provides for the exchange of data over a common local media.
12. What are key considering factors when grouping hosts into common networks?
Network address
To facilitate the entry and exit of data on media.
As the commands are entered.
A. purpose b. geographic location c. ownership
13. After an ethernet collision - which device has priority to transmit data?
Any device whose backoff timer expires first.
A. copper UTP b. optical fiber
0 to 1023
Flash
14. An admin needs to keep contents private - which access method should he use?
Collisions can decrease network performance.
It does not support encryption.
SSH
Console
15. If there is a graphic representation of a company network wiring and equipment - What is this called?
Time-to-live (TTL)
A. copper UTP b. optical fiber
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
A physical topology.
16. Important characteristic of UDP
Minimal delays in data delivery.
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. it has centralized administration b. security is easier to enforce
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
17. When do changes take effect in a Cisco router?
As the commands are entered.
A. addressing b. error detection c. frame delimiting
Physical
A. non-deterministic b. less overhead c. collisions exist
18. What is a component of a routing table entry?
A. minimizing of collisions b. division into broadcast domains
Next-Hop Address
UTP
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
19. When a device is moved from one network to the other...?
Transport
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A default gateway (router).
As the commands are entered.
20. To make a console connection from a comp to a Cisco router - what cable should be used?
Host A
A physical topology.
Rollover cable
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
21. What is a benefit of a WAN?
Source Port
Host mobility
Binary ANDing
Logical Link Control sublayer
22. Which IP packet field will prevent endless loops?
255.255.255.0
It uses support from the lower layers to distinguish between connections to the service.
Time-to-live (TTL)
A. physical layer b. DLL layer
23. What information is added during encapsulation at OSI Layer 3?
A. it has centralized administration b. security is easier to enforce
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
Source and Destination IP address
It reduces unnecessary broadcasts.
24. 3 statements of media acess control
Wireless
Collisions can decrease network performance.
A. they initiate data exchanges b. they may upload data to servers
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
25. Statements that describe LAN
Source and Destination IP address
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Create signals that represent the bits in each frame for the media.
RJ-45
26. Network Protocols
A. define structure of layer specific PDUs b. outline the functions necessary for communication between layers c. require layer dependent capsulations
Hub
RJ-45
Application Layer
27. What are 2 email components used to forward mail between servers?
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
RJ-45
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. MTA b. SMTP
28. What is the primary function of encapsulating packets into frames?
Originate data flow.
To facilitate the entry and exit of data on media.
Network Layer
Logical Link Control sublayer
29. 2 most commonly used media types in ethernet networks
As the commands are entered.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
A. copper UTP b. optical fiber
Router
30. Which characteristics describe fiber optic cable?
A. not affected by EMI of RFI b. most expensive type of LAN cabling
The destination host address.
Signal loss can be experienced.
A. hot keys b. context-sensitive c. command syntax check
31. 3 facts about the network portion of an IPv4 address
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
Host A
Time-to-live (TTL)
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
32. What do the intermediary devices in the network do?
A. determine pathways for data b. retrieve and retransmit data signals c. manage data flows
The physical address is added.
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
Ctrl + Shift + 6
33. What are 2 common characteristics associated w/ dynamic routing protocols?
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
Network portion
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
The destination host address.
34. When a collision occurs using CSMA/CD - how do hosts w/ data to transmit respond after the backoff period expires?
Switch
It does not support encryption.
Hosts return to listen-before-transmit mode.
Transport
35. 3 features that allow TCP to realibly and accurately track the transmission of data
A. flow control b. session establishment c. numbering and sequencing
MAC
Fiber
OTDR
36. What is dinamically selected by the source host when forwarding data?
Host mobility
Network address
Source Port
A. the router will discard the packet b. the router will send a time exceeded message to the source host
37. What are 3 common problems w/ large networks?
A. perform degradation b. security issues c. host identification
It uses lasers as the light source.
Is a layer of specific encapsulation.
Console
38. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Signal loss can be experienced.
They must wait until the first hosts finish transfering the media.
The destination host address.
40. 2 functions of encapsulation
Application Layer
Hub
32 bits
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
41. statements of IP adressing
A. application b. services
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
8
To enable a receiving host to forward the data to the appropriate application.
42. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
A. perform degradation b. security issues c. host identification
A. replace a switch w/ a router b. subnet the new networks
Destination Network Address
A. provide routers w/ up-to-date routing tables b. consume bandwidth to exchange route info
43. At which layer of the TCP/IP model does ethernet operate?
Network Access
Identify processes or services that are communicating with end devices.
Window Size
Minimal delays in data delivery.
44. 3 common problems w/ a large network
A. performance degradation b. security issues c. host identification
To prevent the receiver from being overwhelmed by incoming data.
MAC
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
45. During encapsulation - what happens in the Data Link Layer?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. performance degradation b. security issues c. host identification
Network Access
The physical address is added.
46. What is PDU?
A. application b. services
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
Console interface
Is a layer of specific encapsulation.
47. What statements describe the logical token-passing topology?
A. netstat -r b. route PRINT
A. next-hop b. metric/interface c. destination network address
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Twisting of the cables
48. What are 2 commands used to view a host routing table?
A. replace a switch w/ a router b. subnet the new networks
A. netstat -r b. route PRINT
172.16.192.160
A physical topology.
49. What is a characteristic of a logical point-to-point topology?
A default gateway (router).
The MAC protocol can be very simple.
As the commands are entered.
A. minimizing of collisions b. division into broadcast domains
50. Intermediary devices used to implement security between networks
A. router b. firewall
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
Network address
Originate data flow.