SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA - 2
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a disadvantage of Telnet?
A. it has centralized administration b. security is easier to enforce
Supports error detection.
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
It does not support encryption.
2. What is the role of the OSI Application Layer?
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
Next-Hop Address
It provides interface between applications on either end of the network.
A. low overhead b. connectionless
3. Which OSI layer is responsible for binary transmission - cable specification - and physical aspects of network communication?
Physical
A. non-deterministic b. less overhead c. collisions exist
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
4. Default Gateway is incorrect on the host - What is the impact on the communications?
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
Source Port
5. What is the proper order of the OSI Layers?
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Wireless
Destination Network Address
FTP
6. What is the primary funcion of the trailer in the Data Link Layer encapsulation?
Is a layer of specific encapsulation.
It uses lasers as the light source.
Show Interfaces
Supports error detection.
7. What correctly describes a MAC address?
Console interface
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
A. router b. firewall
A. copied into RAM during system startup b. contains a 3 byte OUI c. is 6 bytes long
8. What is the purpose of resource records in DNS?
Is used by the server to resolve names.
A. minimizing of collisions b. division into broadcast domains
A default gateway (router).
A. router b. firewall
9. 3 facts about the network portion of an IPv4 address
Hosts return to listen-before-transmit mode.
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
A. 48 binary bits in length b. physical addresses c. represented in a hexadecimal format
A. Physical b. Data Link
10. Which IP packet field will prevent endless loops?
Network address
Time-to-live (TTL)
A. replace a switch w/ a router b. subnet the new networks
It has expanded adressing capabilities.
11. In a connectionless system - What is correct?
UTP
Destination is not contacted before a packet is sent.
The address of the router that the host will use to 'get to the other side'.
Source and Destination Ports
12. What is a drawback of the CSMA/CD access method?
It provides for the exchange of data over a common local media.
IP Protocol
A. Physical b. Data Link
Collisions can decrease network performance.
13. 3 primary functions of the data link layer encapsulation
Host2 sends a segment to Host1 with: ACK flag = 1 SYN flag = 1
A. addressing b. error detection c. frame delimiting
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
Fiber
14. What is dinamically selected by the source host when forwarding data?
Source Port
A physical topology.
To enable a receiving host to forward the data to the appropriate application.
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
15. What can get you to an outside network?
Flash
A default gateway (router).
MAC
A. decentralized resources b. resource sharing w/o a dedicated server
16. What command will you use to place the router into the correct mode to configure an appropiate interface to connect a LAN?
A. MTA b. SMTP
A. hot keys b. context-sensitive c. command syntax check
Source and Destination IP address
Router(config)# interface FastEthernet 0/1
17. What are 2 features of User Diagram Protocol (UDP)?
A. if destination network is directly connected - router forwards packet to destination host b. if no route exists for the destination and the default route is present - packet if fowarded to the next-hop c. if the originating host has a default gate
A. low overhead b. connectionless
A. larger address space b. data types and classes of service c. authentication and encryption
2046
18. What method of signal transmission uses radio waves to carry signals?
Is a layer of specific encapsulation.
Wireless
To facilitate the entry and exit of data on media.
Logical Link Control sublayer
19. What are 2 forms of application layer software?
A. application b. services
A. MTA b. SMTP
Is a layer of specific encapsulation.
A. they segment broadcast domains b. they interconnect different network technologies c. each router interface requires a separate network or subnet
20. When do changes take effect in a Cisco router?
Switch
To facilitate the entry and exit of data on media.
As the commands are entered.
172.16.192.160
21. Which portion of the network layer address does a router use to forward packets?
Network portion
A. replace a switch w/ a router b. subnet the new networks
255.255.255.0
A. larger address space b. data types and classes of service c. authentication and encryption
22. 3 factors that should be considered when implementing Layer 2 protocols
A. geographic scope of the network b. physical layer implementation c. number of hosts to be interconnected
Rollover cable
A. DB 60 b. Winchester 15-pin c. smart serial
When connecting a host to a switch.
23. What is the purpose of the TCP/IP Network Application Layer?
Network Media Control
A. application b. presentation c. session d. transmision e. network f. data link g. physical
Static
Wireless
24. What is an automated service that matches resource names w/ required IP addresses?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
DNS
Application Layer
Signal loss can be experienced.
25. What is the role of MTA in handling email?
Hosts return to listen-before-transmit mode.
Rollover cable
Originate data flow.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
26. An admin wants to evaluate all traffic in a network. To ensure that all packets are captured - what network device should be used?
Destination is not contacted before a packet is sent.
Network address
Hub
A. flow control b. session establishment c. numbering and sequencing
27. What is the name of the application layer protocol used for file sharing on Microsoft Networks?
Destination Network Address
Ctrl + Shift + 6
SMB
MAC
28. If there is a graphic representation of a company network wiring and equipment - What is this called?
OTDR
A. Cat5 UTP b. Cat6 UTP
A physical topology.
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
29. A company is planning to subnet a network w/ 27 hosts. What would be the subnet mask used for this?
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
Static
A. MTA b. SMTP
255.255.255.224
30. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
DNS
Binary ANDing
172.16.192.160
Signal loss can be experienced.
31. What do you need to use for an initial configuration on a Cisco router?
Console interface
Source and Destination Ports
TCP initializes the sequence numbers for the sessions.
Supports error detection.
32. What is a protocol that provides connectionless network layer services?
A default gateway (router).
IP Protocol
A. router b. firewall
Source Port
33. In business LANs - which connector is used w/ twisted-pair networking cable?
The packets will be delivered and reassembled at destination.
RJ-45
As the commands are entered.
A. receives emails from clients MUA b. uses SMTP to route email between servers c. passes email to MDA for final delivery
34. At which layer of the TCP/IP model does ethernet operate?
Network Access
Physical
A. located in a single geographical area b. administered by a single organization c. each end is connected to a Telecommunication Service Provider (TSP)
A. identifies pieces of data as part of the same communication b. ensures the data pieces can be directed to the correct receiving end device
35. 3 properties of peer-2-peer applications
A. consumes network bandwidth b. increases overhead on network c. interrupts other host functions
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
Fiber
A. perform degradation b. security issues c. host identification
36. If you have a small network w/ 3 computers...
A. performance degradation b. security issues c. host identification
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. identifies the communicating applications b. identifies multiple conversations between the hosts
A. they initiate data exchanges b. they may upload data to servers
37. What can you identify when you examine the Network Layer header?
The destination host address.
A. addressing b. error detection c. frame delimiting
UDP
A. DNS b. SMTP c. POP
38. 3 measures of data transfer
When connecting a host to a switch.
A. application b. services
To facilitate the entry and exit of data on media.
A. goodput b. throughput c. bandwidth
39. There are 4 different hosts connected to a hub - media is being transfered between 2 of them but the other 2 will also like to transfer media. What must the latest hosts do to transfer the media?
They must wait until the first hosts finish transfering the media.
Rollover cable
Signal loss can be experienced.
A. not affected by EMI of RFI b. most expensive type of LAN cabling
40. What is the primary reason for developing IPv6?
Static
It has expanded adressing capabilities.
A. greater distances per cable run b. limited susceptibility to EMI/RFI c. greater bandwidth potential
A random delay helps prevent the stations from experiencing another collision during transmission.
41. Which transport layer protocol provides low overhead and is used for applications that do not require reliable data delivery?
A. acts as both client and server w/ same communication b. hybrid mode includes a centralized directory of files c. can be used in client-server networks
It is used for timing synchronization w/ alternating patterns of 1s and 0s.
UDP
They must wait until the first hosts finish transfering the media.
42. Why are port numbers included in the TCP header of a segment?
To enable a receiving host to forward the data to the appropriate application.
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
A. HTTP b. HTTPS
A. perform degradation b. security issues c. host identification
43. 2 common methods for settin a UTP ethernet port to MDI or MDIX?
UDP
A. automatic detection and negotiating of MDI/MDIX operation of the port b. enabling the mechanism to electrically swap the transmit and receive pairs
Router(config)# hostname Costas
A. is identical for all hosts in a broadcast domain b. varies in length c. is used to forward packet
44. Which layer supplies services and allows user interface?
Application Layer
IP Protocol
The magnetic field around the adjacent pairs of wire.
Network Media Control
45. An admin needs a media that can run up to 100m in legth. Which type of media would be best?
The destination host address.
UTP
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. perform degradation b. security issues c. host identification
46. What is a mechanism used by TCP to provide flow control as segments travel from source to destination?
Identify the device that allows local network computers to communicate w/ devices in other networks.
A. Physical b. Data Link
Window Size
A. servers b. routers c. network printers
47. What event occurs during the 3-way handshake?
A. copper UTP b. optical fiber
TCP initializes the sequence numbers for the sessions.
A. servers b. routers c. network printers
Ctrl + Shift + 6
48. What 2 type of cables would most commonly be used for new runs?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
Source Port
A. Cat5 UTP b. Cat6 UTP
Static
49. With TCP/IP encapsulation - which range of port numbers identifies all well known applications?
FTP
0 to 1023
The host can communicate w/ other hosts in the local network but is unable to communicate w/ hosts on the other networks.
Binary ANDing
50. What describes the purpose of default route?
A. security is difficult to enforce b. if one of the computers is responding to file sharing requests - that computer is functioning as a server
A. goodput b. throughput c. bandwidth
Host uses a default route to transfer data to host outside the local network when no other route to the destination exists.
Destination Network Address