SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
Network Layer
Network address
172.16.192.160
A backbone cable.
2. If the router says: 'Switch-East4#' What identifies the CLI mode represented?
A. minimizing of collisions b. division into broadcast domains
A. enable mode b. priviledge executive mode
Is a layer of specific encapsulation.
Logical Link Control sublayer
3. 3 functions of the upper data link sublayer in the OSI model
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
The packets will be delivered and reassembled at destination.
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
No collisions will occur on this link.
4. Why are port numbers included in the TCP header of a segment?
It provides interface between applications on either end of the network.
A. it has centralized administration b. security is easier to enforce
To enable a receiving host to forward the data to the appropriate application.
Router(config)# interface FastEthernet 0/1
5. Where is the IOS file stored at?
A. physical layer b. DLL layer
Flash
A. decentralized resources b. resource sharing w/o a dedicated server
It has expanded adressing capabilities.
6. What causes crosstalk within cable pairs when using UTP?
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
The magnetic field around the adjacent pairs of wire.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Application Layer
7. 3 characteristics of valid Ethernet Layer 2 addresses
A. DB 60 b. Winchester 15-pin c. smart serial
Resolve IPv4 addresses to MAC addresses.
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. netstat -r b. route PRINT
8. What layer encapsulates segments into packets?
A. it has centralized administration b. security is easier to enforce
Network Layer
Network Media Control
The packets will be delivered and reassembled at destination.
9. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
Hub
Rollover cable
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Signal loss can be experienced.
10. At which layers of the OSI model does ethernet operate?
Physical
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. physical layer b. DLL layer
Network Layer Packet
11. 3 measures of data transfer
Switch
Destination Network Address
A. goodput b. throughput c. bandwidth
The destination host address.
12. What do end devices do?
IP Protocol
As the commands are entered.
Originate data flow.
A. identifies network layer protocol b. makes the connection w/ the upper layers c. insulates network layer protocols from changes in physical equipment
13. In a connectionless system - What is correct?
A. the router will discard the packet b. the router will send a time exceeded message to the source host
Is a layer of specific encapsulation.
Destination is not contacted before a packet is sent.
Source and Destination Ports
14. What makes fiber preferable to copper for interconnecting buildings?
When connecting a host to a switch.
A. minimizing of collisions b. division into broadcast domains
Application Layer
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
15. 2 functions of encapsulation
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
2046
A. it has centralized administration b. security is easier to enforce
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
16. In an IPv4 environment - what information is used by the router to forward data packets from one interface of a router to another?
Transport
A. physical layer b. DLL layer
Destination Network Address
The physical address is added.
17. Statements that describe LAN
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
8
The address of the router that the host will use to 'get to the other side'.
18. What is a disadvantage of Telnet?
Originate data flow.
It does not support encryption.
IP Protocol
A. flow control b. session establishment c. numbering and sequencing
19. What are the advantages of using a client-server model?
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
A. it has centralized administration b. security is easier to enforce
A random delay helps prevent the stations from experiencing another collision during transmission.
Source and Destination IP address
20. What is the primary rope of the physical layer in transmitting data?
To enable a receiving host to forward the data to the appropriate application.
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Create signals that represent the bits in each frame for the media.
MAC
21. How many bits make up an IPv4 address?
A. copper UTP b. optical fiber
A. servers b. routers c. network printers
32 bits
Create signals that represent the bits in each frame for the media.
22. What statements describe the logical token-passing topology?
Rollover cable
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
To prevent the receiver from being overwhelmed by incoming data.
A. computers are allowed to transmit data only when they posses a token b. electronic tokens are passes sequentially to each other
23. What is dinamically selected by the source host when forwarding data?
To prevent the receiver from being overwhelmed by incoming data.
Source Port
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. HTTP b. HTTPS
24. What are 3 pieces of info about a route contained in a routing table?
A. next-hop b. metric/interface c. destination network address
Destination Network Address
A. hot keys b. context-sensitive c. command syntax check
Rollover cable
25. What do you need to use for an initial configuration on a Cisco router?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. it has centralized administration b. security is easier to enforce
A. enable mode b. priviledge executive mode
Console interface
26. What device can check for faults - integrity and performance of media?
OTDR
Resolve IPv4 addresses to MAC addresses.
Router
RJ-45
27. Which characteristics describe fiber optic cable?
Transport
A. not affected by EMI of RFI b. most expensive type of LAN cabling
Hosts return to listen-before-transmit mode.
Ctrl + Shift + 6
28. Which type of cable is most often associated w/ fiber-optic cable?
A backbone cable.
Console interface
The physical address is added.
As the commands are entered.
29. What can be a problem that is reduced by adding end-to-end addressing?
FTP
It reduces unnecessary broadcasts.
Supports error detection.
Time-to-live (TTL)
30. 3 features of IPv6
A. larger address space b. data types and classes of service c. authentication and encryption
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
A. router discards the packet b. router forwards the packet out the interface indicated in the route entry
31. At which layer of the TCP/IP model does ethernet operate?
TCP initializes the sequence numbers for the sessions.
Network Access
Is a layer of specific encapsulation.
A. ethernet utilizes CSMA/CD b. defined as placement of data frames on the media c. DLL protocols define the rules for access to different media
32. What is a default gateway address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. How does the application layer on a server process multiple client requests for services?
A. low overhead b. connectionless
Switch
It uses support from the lower layers to distinguish between connections to the service.
A. media sharing b. logical topology
34. 2 things that will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A backbone cable.
A. the router will discard the packet b. the router will send a time exceeded message to the source host
A. router b. firewall
35. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
Logical Link Control sublayer
Window Size
MAC
It does not support encryption.
36. What is an effect of improperly applying a network cable connector?
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Fiber
Signal loss can be experienced.
37. What is the purpose of the TCP/IP Network Application Layer?
SMB
A. they initiate data exchanges b. they may upload data to servers
Network Media Control
Destination is not contacted before a packet is sent.
38. What application layer protocol is used to support file transfers between client and server?
A. addressing b. error detection c. frame delimiting
32 bits
Rollover cable
FTP
39. What is a drawback of the CSMA/CD access method?
A. identifies the communicating applications b. identifies multiple conversations between the hosts
Collisions can decrease network performance.
Physical
Network address
40. statements of IP adressing
A. private addresses are blocked from public internet by routers b. the ip address 127.0.0.1 is the loopback - directs traffic to itself
A. media sharing b. logical topology
It provides interface between applications on either end of the network.
It reduces unnecessary broadcasts.
41. 3 features that allow TCP to realibly and accurately track the transmission of data
A. flow control b. session establishment c. numbering and sequencing
Time-to-live (TTL)
Network Layer
Router(config)# hostname Costas
42. What are 3 common problems w/ large networks?
Network Layer
Any device whose backoff timer expires first.
A. perform degradation b. security issues c. host identification
A. low overhead b. connectionless
43. What is the primary purpose of Layer 4?
Source and Destination Ports
Identify processes or services that are communicating with end devices.
A. Physical b. Data Link
2046
44. 3 common problems w/ a large network
Network address
A. performance degradation b. security issues c. host identification
The physical address is added.
Host mobility
45. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
They must wait until the first hosts finish transfering the media.
A. hot keys b. context-sensitive c. command syntax check
A. non-deterministic b. less overhead c. collisions exist
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
46. What is a benefit of a WAN?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
To enable a receiving host to forward the data to the appropriate application.
Fiber
Host mobility
47. When a device is moved from one network to the other...?
A. the device will still operate at the same Layer 2 address (the address it had before) b. Layer 3 address must me reassigned for it to communicate w/ the network
A default gateway (router).
32 bits
Resolve IPv4 addresses to MAC addresses.
48. What is the primary reason for developing IPv6?
A. minimizing of collisions b. division into broadcast domains
A. HTTP b. HTTPS
Show Interfaces
It has expanded adressing capabilities.
49. What are 2 commands used to view a host routing table?
To prevent the receiver from being overwhelmed by incoming data.
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
Router
A. netstat -r b. route PRINT
50. Host1 is in the process of setting up a TCP session with Host2. Host1 sent a SYN message to begin establishment - what happens next?
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Flash
Console
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests