SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Hard
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following are types of flow control?
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
Buffering - Cut-through - and Congestion avoidance
It is used to prevent switching loops in networks with redundant switched routes.
Path selections and Packet switching.
2. As a CCNA candidate - you will be expected to know the OSI model very well. Which of the following are associated with the application layer (layer 7) of the OSI model?
The Bridgeg ID and The bridge priority
Show cdp neighbor detail
HTTPS - SMTP - and TFTP
Telnet and FTP
3. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
Auto - Desirable - and On
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
Decrease the window size.
4. Network equipment supporting the use of flow control mechanisms has been recently installed in the CK network. What is the purpose of flow control in a data network?
An electrical pulse indicates that the collision has cleared.
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
Learning - Listening - and Forwarding
The network layer
5. You need to configure two Certkiller switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?
VTP
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
SMTP - FTP - HTTP - and HTTPS
6. Acknowledgements - sequencing - and flow control are functions that are handled by which layer of the OSI model?
Increased latency and Filtering of all frame errors
Layer 4
A broadcast address will never be the source address of a frame
It is the sum of the costs based on bandwidth
7. Which three statements are true about the operation of a full-duplex Ethernet network - which is being used in the Certkiller LAN?
Network
Hosts use a logical bus topology
A hub and A repeater.
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
8. Some of the older Certkiller switches store the entire frame before forwarding it to the destination. What are two effects on network performance of configuring a switch to do this?
Increased latency and Filtering of all frame errors
Show cdp neighbor detail
In an improperly implemented redundant topology
The Bridgeg ID and The bridge priority
9. You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operations?
Application
Encapsulations PPP and authentication CHAP
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
Switches increase the number of collision domains in the network.
10. Which line from the output of the show ip interface command indicates that there is a Layer 1 problem?
All switch and bridge ports are in either the forwarding or blocking state.
Configure the switch so that it has a lower priority than other switches in the network.
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
Serial0/1 is down - line protocol is down
11. The Certkiller corporate LAN consists of one large flat network. You decide to segment this LAN into two separate networks with a router. What will be the affect of this change?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. Two buildings on the London campus of a CK corporation must be connected to use Ethernet with a bandwidth of at least 100 Mbps. CK is concerned about possible problems from voltage potential differences between the two buldings. Which media type shou
They can provide hosts with information about network problems. and They are encapsulated within IP datagrams.
Fiber optic cable.
In an improperly implemented redundant topology
It is the sum of the costs based on bandwidth
13. You are the administrator of the Certkiller LAN and you have been reviewing error logs of networking devices and notice a large number of errors associated with several MAC addresses. You suspect that some of the errors are being generated by the rou
Show arp and Show interface
802.1Q and ISL
Learning - Listening - and Forwarding
Layer 3
14. A Certkiller technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the sh
Buffering - Cut-through - and Congestion avoidance
Data link
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
Layer 3
15. An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location?
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
Application
16. Although TCP segments are similar to UDP segments - TCP packets contains some additional fields. Which of the following are found in a TCP header - but not in a UDP header?
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
Sequence number - Window size - and Acknowledgment number
HTTPS - SMTP - and TFTP
17. Both bridges are switches are being used throughout the CK LAN. Which of the following statements are true regarding bridges and switches in this network?
Serial0/1 is down - line protocol is down
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
Switches increase the number of collision domains in the network.
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
18. Which Layer 4 protocol is used for a Telnet connections between two CK routers?
Hosts use a logical bus topology
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
TCP
Switches - Bridges - and Routers
19. A new switch is installed in the Certkiller network. This switch is to be configured so that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network. Which of the conditions below have to be met in o
HTTPS - SMTP - and TFTP
HTTPS
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
Port security
20. When you compare the differences between half-duplex and full-duplex Ethernet - which of the following characteristics are exclusive to half-duplex?
SMTP - FTP - HTTP - and HTTPS
CertK Switch(config)# ip default-gateway 192.168.1.115
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
21. Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?
Switches - Bridges - and Routers
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
VTP
It is the sum of the costs based on bandwidth
22. The Certkiller network administrator needs to a switch named CK1 to become the root bridge for a redundant path switched network. What can be done to ensure that CK1 will always assume the role as the root bridge?
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
Certkiller B > trace
Layer 4
Configure the switch so that it has lower priority than other switches in the network
23. Both the switches and hubs are being utilized within the CK network. Which of the following is true regarding the use of switches and hubs for the network connectivity in this network?
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
The Bridgeg ID and The bridge priority
Switches increase the number of collision domains in the network.
Increased latency and Filtering of all frame errors
24. Which of the following correctly describe steps in the OSI date encapsulation process?
Layer 4
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
Switches - Bridges - and Routers
25. The system LED is amber on a new Certkiller Catalyst 2950 series switch. What does this indicate?
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
The system is malfunctioning.
Certkiller B > trace
SMTP FTP and HTTP
26. What is the IEEE standard associated with Gigabit Ethernet?
Serial0/1 is down - line protocol is down
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
Increased latency and Filtering of all frame errors
802.3ab and 802.3z
27. Which two of the following values does STP take into consideration when it elects the root bridge?
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
VTP will allow switches to share VLAN configuration information
All switch and bridge ports are in either the forwarding or blocking state.
The Bridgeg ID and The bridge priority
28. A host computer has been correctly configured with a static IP address - but the default gateway is incorrectly set. Which layer of the OSI model will be first effected by this configuration error?
To allow remote management of the switch.
Layer 3
Serial0/1 is down - line protocol is down
Source Port - Acknowledgment Number - and Window
29. The corporate head office of Certkiller has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence - wh
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
Certkiller B > trace
To prevent switching loops in networks with redundant switched paths.
Hosts use a logical bus topology
30. In a switched LAN network - What is the Spanning-Tree algorithm used for?
It is used to prevent switching loops in networks with redundant switched routes.
Switches increase the number of collision domains in the network.
To prevent switching loops in networks with redundant switched paths.
Information about a route should never be sent back in the direction from which the original update came.
31. You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network?
The port is experiencing errors
Application
Congestion avoidance - Windowing and Buffering
The network layer
32. Certkiller is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions - the company needs to make sure that the phone traffic is on a different network
VLAN and Swtich
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
Auto - On - and Desirable
Sequence number - Window size - and Acknowledgment number
33. A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role of the Root Bridge?
Hosts use a logical bus topology
Configure the switch so that it has a lower priority than other switches in the network.
Layer 4
Data link
34. What is the purpose of the spanning-tree algorithm in a switched LAN?
ARP and ICMP
To prevent switching loops in networks with redundant switched paths.
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
STP
35. Which of the protocols below - operates at Layer 2 of the OSI model - and is used to maintain a loop-free network?
STP
All switch and bridge ports are in either the forwarding or blocking state.
HTTPS - SMTP - and TFTP
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
36. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?
The network layer
Layer 3
It operates without collisions and It provides faster data transfer
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
37. You are logged into a router and wish to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?
Show cdp neighbor detail
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
Sequence number - Window size - and Acknowledgment number
38. You need to perform some initial configuration tasks on a new Certkiller switch. What is the purpose of assigning an IP address to a switch?
To allow remote management of the switch.
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
39. As the Certkiller network administrator - you are required to have a firmunderstanding of the OSI model. Why does the data communication industry use the layered OSI reference model?
The interfaces must be configured for NAT.
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
It is the sum of the costs based on bandwidth
The switch will forward the frame to a specific port
40. Which three of the protocols below belong to the application layer? (Select three answer choices)
HTTPS - SMTP - and TFTP
Configure the switch so that it has a lower priority than other switches in the network.
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
Telnet and FTP
41. Which two statements describe the operation of the CSMA/CD access method - which is in use on the Certkiller network?
An additional broadcast domain will be created.
In a CSMA/CD collision domain - stations must wait until the media is not in use before transmitting. and After a collision - all stations run a random backoff algorithm. When the backoff delay period has expired - all stations have equal priority to
In an improperly implemented redundant topology
Switches increase the number of collision domains in the network.
42. While troubleshooting a network connectivity problem - a Certkiller technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However - when the ping command is issued from the works
CertK Switch(config)# ip default-gateway 192.168.1.115
The network layer
STP
Buffering - Cut-through - and Congestion avoidance
43. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the Certkiller Switched LAN?
Certkiller B > trace
In an improperly implemented redundant topology
All switch and bridge ports are in either the forwarding or blocking state.
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
44. CDP is being used trhoughout the CK network. What are two reasons why the CK network administrator would use CDP?
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
Port security
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
It is used to prevent switching loops in networks with redundant switched routes.
45. Two stations on the Certkiller LAN transmit at the same time - resulting in a collision. What happens when a collision occurs on the network?
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
Layer 4
The network layer
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
46. Which of the following are spanning tree port states?
Port security
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth
Learning - Listening - and Forwarding
47. As a Certkiller trainee you are required to set the default gateway on a Cisco switch to the IP address of 192.168.1.115. Which IOS command should you use?
CertK Switch(config)# ip default-gateway 192.168.1.115
Application
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
Configure the switch so that it has lower priority than other switches in the network
48. Assuming you build networks to exact specifications - What is the recommended maximum length a 10BaseT cable can be before it has to be segmented or repeated?
The port is experiencing errors
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
100 meters
In an improperly implemented redundant topology
49. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
Port security
An additional broadcast domain will be created.
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
A broadcast domain with too many hosts - Broadcast storms - and Low bandwidth
50. Which of the following commands would be applied to a WAN interface - but not on LAN Interface?
Layer 4
Encapsulations PPP and authentication CHAP
The system is malfunctioning.
Duplex mismatch