Test your basic knowledge |

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When a switch port is used as a VLAN trunk - which of the following trunk modes are valid?






2. What is the IEEE standard associated with Gigabit Ethernet?






3. A new switch is installed in the Certkiller network. This switch is to be configured so that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network. Which of the conditions below have to be met in o






4. While troubleshooting a network connectivity problem - a Certkiller technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However - when the ping command is issued from the works






5. Why is full-duplex Ethernet superior to its single-duplex counterpart?






6. Network equipment supporting the use of flow control mechanisms has been recently installed in the CK network. What is the purpose of flow control in a data network?






7. While troubleshooting a connectivity problem on the network - you issure the ping command from your PC command prompt - but the output shows 'request times out' At which OSI layer is this problem associated with?






8. Both the switches and hubs are being utilized within the CK network. Which of the following is true regarding the use of switches and hubs for the network connectivity in this network?






9. Split horizon has been enabled within the Certkiller routed network. Which one of the following statements best explains the split horizon rule?






10. Which Layer 4 protocol is used for a Telnet connections between two CK routers?






11. Which of the following services use TCP?






12. What is the purpose of the spanning-tree algorithm in a switched LAN?






13. You need to perform some initial configuration tasks on a new Certkiller switch. What is the purpose of assigning an IP address to a switch?






14. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?






15. CDP is running between two CK devices. What information is supplied by CDP?






16. When comparing and contrasting the similarities and differences between bridges and switches - which of the following are valid statements?






17. Which of the following correctly describe steps in the OSI date encapsulation process?






18. You are the administrator of the Certkiller LAN and you have been reviewing error logs of networking devices and notice a large number of errors associated with several MAC addresses. You suspect that some of the errors are being generated by the rou






19. Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?






20. The CK network administrator needs to determine what LAN devices to install on the CK network. What are two advantages of using Layer 2 Ethernet switches over hubs?






21. Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?






22. Which of the following can lead to the contribution of LAN traffic congestion?






23. You are experiencing intermittent issues relating to congestion within the Certkiller network. What are the possible causes of congestion on this LAN?






24. You need to configure two Certkiller switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?






25. Which three statements are true about the operation of a full-duplex Ethernet network - which is being used in the Certkiller LAN?






26. What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?






27. A Certkiller technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the sh






28. With regard to Ethernet media access methods - which of the following are true?






29. Both bridges are switches are being used throughout the CK LAN. Which of the following statements are true regarding bridges and switches in this network?






30. A Certkiller Ethernet switch receives a unicast frame with a destination MAC that IS listed in the switch table. What will this switch do with the frame?






31. As a Certkiller trainee you are required to set the default gateway on a Cisco switch to the IP address of 192.168.1.115. Which IOS command should you use?






32. Which of following VLAN frame encapsulation types are configurable on a Cisco switch?






33. A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role of the Root Bridge?






34. The LAN needs are expanding at the CK corporate office - which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the CK network. Which of the following are layer 1 devices that you can use?






35. At which OSI layer is a logical path created between two host systems named CK1 and CK2 on the Certkiller LAN?






36. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the Certkiller Switched LAN?






37. You want to influence the root bridge selection within the Certkiller LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)






38. Which of the following correctly describe the various functions and virtues of a router?






39. A host computer has been correctly configured with a static IP address - but the default gateway is incorrectly set. Which layer of the OSI model will be first effected by this configuration error?






40. Which line from the output of the show ip interface command indicates that there is a Layer 1 problem?






41. Which of the following devices can the Certkiller network administrator use to segment the LAN?






42. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?






43. The corporate head office of Certkiller has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence - wh






44. Although TCP segments are similar to UDP segments - TCP packets contains some additional fields. Which of the following are found in a TCP header - but not in a UDP header?






45. Which OSI layer header contains the address of a destination host that is on another network?






46. Two buildings on the London campus of a CK corporation must be connected to use Ethernet with a bandwidth of at least 100 Mbps. CK is concerned about possible problems from voltage potential differences between the two buldings. Which media type shou






47. Which one of the following characterisitcs is true regardigin the use of the hubs and switches?






48. The Certkiller network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?






49. You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network?






50. What kind of cable should be used to establish a trunked line between two Catalyst switches?