Test your basic knowledge |

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Certkiller has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?






2. What kind of cable should be used to establish a trunked line between two Catalyst switches?






3. Acknowledgements - sequencing - and flow control are functions that are handled by which layer of the OSI model?






4. You are the administrator of the Certkiller LAN and you have been reviewing error logs of networking devices and notice a large number of errors associated with several MAC addresses. You suspect that some of the errors are being generated by the rou






5. As a CCNA candidate - you will be expected to know the OSI model very well. Which of the following are associated with the application layer (layer 7) of the OSI model?






6. Some of the older Certkiller switches store the entire frame before forwarding it to the destination. What are two effects on network performance of configuring a switch to do this?






7. Which three statements are true about the operation of a full-duplex Ethernet network - which is being used in the Certkiller LAN?






8. You need to perform some initial configuration tasks on a new Certkiller switch. What are the possible trunking modes for this switch port?






9. The corporate head office of Certkiller has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence - wh






10. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?






11. What is the purpose of the spanning-tree algorithm in a switched LAN?






12. Why is full-duplex Ethernet superior to its single-duplex counterpart?






13. Which protocol uses TCP port 443 at layer 4?






14. Which layer of the OSI reference model is responsible for ensuring reliable end to end delivery of data?






15. A host computer has been correctly configured with a static IP address - but the default gateway is incorrectly set. Which layer of the OSI model will be first effected by this configuration error?






16. You need to configure two Certkiller switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?






17. Which three of the protocols below belong to the application layer? (Select three answer choices)






18. When you compare the differences between half-duplex and full-duplex Ethernet - which of the following characteristics are exclusive to half-duplex?






19. What is the IEEE standard associated with Gigabit Ethernet?






20. Which of the following are types of flow control?






21. The Certkiller network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?






22. You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operations?






23. At which OSI layer is a logical path created between two host systems named CK1 and CK2 on the Certkiller LAN?






24. You are experiencing intermittent issues relating to congestion within the Certkiller network. What are the possible causes of congestion on this LAN?






25. when files are transferred between a host and an FTP server - the data is divided into smaller pieces of transmission. As these pieces arrive at the destination host they must be reassembled to reconstruct the original file. What provides for the rea






26. What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?






27. Certkiller is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions - the company needs to make sure that the phone traffic is on a different network






28. As a CCNA candidate - you must know the various layers of the OSI model. At which layers of the OSI model do Wide Area Networks operate in?






29. On a half-duplex Ethernet LAN - two hosts attempt to send data simultaneously - resulting in a collision. Following this collision - what will the hosts do?






30. A Certkiller Ethernet switch receives a unicast frame with a destination MAC that IS listed in the switch table. What will this switch do with the frame?






31. You want to influence the root bridge selection within the Certkiller LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)






32. At which layer of the OSI model does the protocol that provides the information displayed by the 'show cdp neighbors' command operate?






33. An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location?






34. Which OSI layer header contains the address of a destination host that is on another network?






35. What are two characteristics of 'store and forward' switching?






36. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?






37. Which of following VLAN frame encapsulation types are configurable on a Cisco switch?






38. The Certkiller LAN is upgrading all devices to operate in full duplex. Which statement is true about full-duplex Ethernet in comparison to half-duplex Ethernet?






39. Which of the following commands would be applied to a WAN interface - but not on LAN Interface?






40. The LAN needs are expanding at the CK corporate office - which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the CK network. Which of the following are layer 1 devices that you can use?






41. Two stations on the Certkiller LAN transmit at the same time - resulting in a collision. What happens when a collision occurs on the network?






42. Which of the following correctly describe steps in the OSI date encapsulation process?






43. Which two statements describe the operation of the CSMA/CD access method - which is in use on the Certkiller network?






44. When comparing and contrasting the similarities and differences between bridges and switches - which of the following are valid statements?






45. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?






46. A Certkiller switch is configured with all ports assigned to VLAN 2. In addition - all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?






47. You unsuccessfully try to ping the Internet from the PC host on the LAN. During the troubleshooting process - you enter the 'show ip nat translations' command but the output is blank. What is the most likely cause of the problem?






48. Which of the protocols below - operates at Layer 2 of the OSI model - and is used to maintain a loop-free network?






49. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the Certkiller Switched LAN?






50. Which of the following can lead to the contribution of LAN traffic congestion?