SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Hard
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. By default - which of the following factors determines the spanning-tree path cost?
It is the sum of the costs based on bandwidth
Auto - On - and Desirable
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
2. CK1 is a switch in the Certkiller network. Why will CK1 never learn the broadcast address?
SMTP - FTP - HTTP - and HTTPS
In an improperly implemented redundant topology
A hub and A repeater.
A broadcast address will never be the source address of a frame
3. Although TCP segments are similar to UDP segments - TCP packets contains some additional fields. Which of the following are found in a TCP header - but not in a UDP header?
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
Configure the switch so that it has a lower priority than other switches in the network.
Sequence number - Window size - and Acknowledgment number
Layer 3
4. What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?
Configure the switch so that it has a lower priority than other switches in the network.
The system is malfunctioning.
All switch and bridge ports are in either the forwarding or blocking state.
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
5. Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
SMTP FTP and HTTP
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
To prevent switching loops in networks with redundant switched paths.
6. Both bridges are switches are being used throughout the CK LAN. Which of the following statements are true regarding bridges and switches in this network?
The interfaces must be configured for NAT.
Show arp and Show interface
Encapsulations PPP and authentication CHAP
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
7. Certkiller has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?
VTP will allow switches to share VLAN configuration information
Physical Layer and Datalink Layer
Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth
HTTPS - SMTP - and TFTP
8. A Certkiller technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the sh
The interfaces must be configured for NAT.
Data link
HTTPS - SMTP - and TFTP
Show arp and Show interface
9. What are two characteristics of 'store and forward' switching?
Increased latency and Filtering of all frame errors
Learning - Listening - and Forwarding
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
10. Which of the following are true of Ethernet technology?
Duplex mismatch
Show arp and Show interface
Hosts use a logical bus topology
Auto - On - and Desirable
11. Two stations on the Certkiller LAN transmit at the same time - resulting in a collision. What happens when a collision occurs on the network?
A jam signal informs all devices that a collision occurred. - The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
Application
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
This is an Ethernet port operating at half duplex
12. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the Certkiller Switched LAN?
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
In an improperly implemented redundant topology
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
ARP and ICMP
13. What is the IEEE standard associated with Gigabit Ethernet?
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
The network layer
It will prevent segment 1's broadcasts from getting to segment 2.
802.3ab and 802.3z
14. When you compare the differences between half-duplex and full-duplex Ethernet - which of the following characteristics are exclusive to half-duplex?
Duplex mismatch
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
SMTP FTP and HTTP
15. CDP is being used trhoughout the CK network. What are two reasons why the CK network administrator would use CDP?
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development - design and troubleshooting
802.1Q and ISL
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
802.3ab and 802.3z
16. Which one of the following characterisitcs is true regardigin the use of the hubs and switches?
Show cdp neighbor detail
Switches increase the number of collision domains in the network.
Physical Layer and Datalink Layer
The sequence number in the TCP header.
17. Which of the following commands would be applied to a WAN interface - but not on LAN Interface?
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
Serial0/1 is down - line protocol is down
Encapsulations PPP and authentication CHAP
It is used to prevent switching loops in networks with redundant switched routes.
18. You need to perform some initial configuration tasks on a new Certkiller switch. What is the purpose of assigning an IP address to a switch?
VTP
The Bridgeg ID and The bridge priority
To allow remote management of the switch.
Port security
19. An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location?
SMTP - FTP - HTTP - and HTTPS
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address - subnet mask - and default gateway.
Show arp and Show interface
VTP
20. What is the purpose of the spanning-tree algorithm in a switched LAN?
Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
A cross-over cable
To prevent switching loops in networks with redundant switched paths.
21. The Certkiller LAN is upgrading all devices to operate in full duplex. Which statement is true about full-duplex Ethernet in comparison to half-duplex Ethernet?
The sequence number in the TCP header.
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth
22. With regard to Ethernet media access methods - which of the following are true?
MAC Address and Bridge Priority
TCP
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
Show cdp neighbor detail
23. You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network?
Switches increase the number of collision domains in the network.
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
802.1Q and ISL
Congestion avoidance - Windowing and Buffering
24. You have set up an Internet based FTP server - where people can upload and download files. In terms of the OSI model - What is the highest layer used during the FTP sessions.
Fiber optic cable.
Application
Switches usually have a higher number of ports then most bridges - Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
Path selections and Packet switching.
25. Which of the following correctly describe steps in the OSI date encapsulation process?
Encapsulations PPP and authentication CHAP
Decrease the window size.
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
26. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?
802.3ab and 802.3z
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
Encapsulations PPP and authentication CHAP
This is an Ethernet port operating at half duplex
27. The LAN needs are expanding at the CK corporate office - which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the CK network. Which of the following are layer 1 devices that you can use?
A hub and A repeater.
A CSU/DSU terminates a digital local loop - A modem terminates an analog local loop - A router is commonly considered a DTE device.
Learning - Listening - and Forwarding
Port security
28. You want to influence the root bridge selection within the Certkiller LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
Auto - Desirable - and On
MAC Address and Bridge Priority
Auto - On - and Desirable
29. When a switch port is used as a VLAN trunk - which of the following trunk modes are valid?
The network layer
Device Identifiers - Capabilities list - Platform
Auto - On - and Desirable
Auto - Desirable - and On
30. Which of the following are spanning tree port states?
Network
Fiber optic cable.
HTTPS
Learning - Listening - and Forwarding
31. A new switch is installed in the Certkiller network. This switch is to be configured so that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network. Which of the conditions below have to be met in o
CertK Switch(config)# ip default-gateway 192.168.1.115
It operates without collisions and It provides faster data transfer
SMTP FTP and HTTP
The switch that will share the VLAN information must be in the VTP Server mode. -The switches must be in the same VTP domain. - The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
32. Which of the following services use TCP?
SMTP FTP and HTTP
HTTPS - SMTP - and TFTP
The sequence number in the TCP header.
100 meters
33. Some of the older Certkiller switches store the entire frame before forwarding it to the destination. What are two effects on network performance of configuring a switch to do this?
Port security
Increased latency and Filtering of all frame errors
The switch will forward the frame to a specific port
It is the sum of the costs based on bandwidth
34. The Certkiller network administrator wants to use a router named CK1 to segment the local network. What are some of the advantages of using CK1 to segment the network? (Choose two)
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
To obtain the IP address of a connected device in order to telnet to the device - To verify Layer 2 connectivity between two devices when Layer 3 fails.
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
Auto - On - and Desirable
35. At which layer of the OSI model does the protocol that provides the information displayed by the 'show cdp neighbors' command operate?
Data link
Application
Duplex mismatch
The sequence number in the TCP header.
36. A host computer has been correctly configured with a static IP address - but the default gateway is incorrectly set. Which layer of the OSI model will be first effected by this configuration error?
Application
SMTP - FTP - HTTP - and HTTPS
Layer 4
Layer 3
37. Acknowledgements - sequencing - and flow control are functions that are handled by which layer of the OSI model?
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
Layer 4
This is an Ethernet port operating at half duplex
The host network card and the switch port must be capable of operating in full-duplex mode. - There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
38. You need to configure two Certkiller switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?
Configure the switch so that it has a lower priority than other switches in the network.
VTP
Layer 4
It operates without collisions and It provides faster data transfer
39. Which three of the protocols below belong to the application layer? (Select three answer choices)
Buffering - Cut-through - and Congestion avoidance
HTTPS - SMTP - and TFTP
The sequence number in the TCP header.
Decrease the window size.
40. As a CCNA candidate - you must know the various layers of the OSI model. At which layers of the OSI model do Wide Area Networks operate in?
Duplex mismatch
Layer 3
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
Physical Layer and Datalink Layer
41. Which of the protocols below - operates at Layer 2 of the OSI model - and is used to maintain a loop-free network?
STP
Increased latency and Filtering of all frame errors
VTP will allow switches to share VLAN configuration information
Duplex mismatch
42. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
Telnet and FTP
Port security
It provides a mechanism for the receiver to control the transmission speed - You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private
A broadcast domain with too many hosts - Broadcast storms - and Low bandwidth
43. Which layer of the OSI reference model is responsible for ensuring reliable end to end delivery of data?
Transport
VLAN and Swtich
Show arp and Show interface
Auto - On - and Desirable
44. You unsuccessfully try to ping the Internet from the PC host on the LAN. During the troubleshooting process - you enter the 'show ip nat translations' command but the output is blank. What is the most likely cause of the problem?
HTTPS - SMTP - and TFTP
VTP
The interfaces must be configured for NAT.
Serial0/1 is down - line protocol is down
45. Cisco is the leader in the router market space. What basic functions do their routers perform in a network?
Transport
Device Identifiers - Capabilities list - Platform
It is used to prevent switching loops in networks with redundant switched routes.
Path selections and Packet switching.
46. You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operations?
Application
The sequence number in the TCP header.
802.1Q and ISL
The system is malfunctioning.
47. Which line from the output of the show ip interface command indicates that there is a Layer 1 problem?
Fiber optic cable.
Encapsulations PPP and authentication CHAP
Serial0/1 is down - line protocol is down
Telnet and FTP
48. In a switched LAN network - What is the Spanning-Tree algorithm used for?
It is used to prevent switching loops in networks with redundant switched routes.
802.1Q and ISL
It is the sum of the costs based on bandwidth
The system is malfunctioning.
49. Which Layer 4 protocol is used for a Telnet connections between two CK routers?
Increased latency and Filtering of all frame errors
Device Identifiers - Capabilities list - Platform
The network layer
TCP
50. Both the switches and hubs are being utilized within the CK network. Which of the following is true regarding the use of switches and hubs for the network connectivity in this network?
Sequence number - Window size - and Acknowledgment number
Switches increase the number of collision domains in the network.
The network layer
Application