Test your basic knowledge |

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A Certkiller switch is configured with all ports assigned to VLAN 2. In addition - all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?






2. Acknowledgements - sequencing - and flow control are functions that are handled by which layer of the OSI model?






3. Which fields are included in the TCP header?






4. The CK network administrator needs to determine what LAN devices to install on the CK network. What are two advantages of using Layer 2 Ethernet switches over hubs?






5. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?






6. Which three statements are true about the operation of a full-duplex Ethernet network - which is being used in the Certkiller LAN?






7. Cisco is the leader in the router market space. What basic functions do their routers perform in a network?






8. The Certkiller LAN is upgrading all devices to operate in full duplex. Which statement is true about full-duplex Ethernet in comparison to half-duplex Ethernet?






9. Certkiller has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?






10. You have set up an Internet based FTP server - where people can upload and download files. In terms of the OSI model - What is the highest layer used during the FTP sessions.






11. When you compare the differences between half-duplex and full-duplex Ethernet - which of the following characteristics are exclusive to half-duplex?






12. An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location?






13. You need to perform some initial configuration tasks on a new Certkiller switch. What are the possible trunking modes for this switch port?






14. The Certkiller corporate LAN consists of one large flat network. You decide to segment this LAN into two separate networks with a router. What will be the affect of this change?


15. Which of the following correctly describe steps in the OSI date encapsulation process?






16. You need to configure two Certkiller switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?






17. A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role of the Root Bridge?






18. Two stations on the Certkiller LAN transmit at the same time - resulting in a collision. What happens when a collision occurs on the network?






19. While troubleshooting a connectivity problem - the Certkiller network administrator notices that a port status LED on a Cisco Catalyst Series switch is alternating between green and amber. Which condition could this indicate?






20. Which of the protocols below - operates at Layer 2 of the OSI model - and is used to maintain a loop-free network?






21. Certkiller is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions - the company needs to make sure that the phone traffic is on a different network






22. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?






23. While troubleshooting an issue in the Certkiller LAN you notice that a network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement - What is known about the network interface port?






24. In a switched LAN network - What is the Spanning-Tree algorithm used for?






25. You are logged into a router and wish to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?






26. As the Certkiller network administrator - you are required to have a firmunderstanding of the OSI model. Why does the data communication industry use the layered OSI reference model?






27. As a network Admin - you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?






28. The system LED is amber on a new Certkiller Catalyst 2950 series switch. What does this indicate?






29. When a switch port is used as a VLAN trunk - which of the following trunk modes are valid?






30. Which of the following are spanning tree port states?






31. Which two statements describe the operation of the CSMA/CD access method - which is in use on the Certkiller network?






32. when files are transferred between a host and an FTP server - the data is divided into smaller pieces of transmission. As these pieces arrive at the destination host they must be reassembled to reconstruct the original file. What provides for the rea






33. While troubleshooting a connectivity problem on the network - you issure the ping command from your PC command prompt - but the output shows 'request times out' At which OSI layer is this problem associated with?






34. A Certkiller technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the sh






35. Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?






36. What kind of cable should be used to establish a trunked line between two Catalyst switches?






37. Which of the following devices can the Certkiller network administrator use to segment the LAN?






38. At which OSI layer is a logical path created between two host systems named CK1 and CK2 on the Certkiller LAN?






39. ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets?






40. Which of the following can lead to the contribution of LAN traffic congestion?






41. On a half-duplex Ethernet LAN - two hosts attempt to send data simultaneously - resulting in a collision. Following this collision - what will the hosts do?






42. When comparing and contrasting the similarities and differences between bridges and switches - which of the following are valid statements?






43. The corporate head office of Certkiller has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence - wh






44. Which of the protocols below use TCP at the transport layer?






45. Assuming you build networks to exact specifications - What is the recommended maximum length a 10BaseT cable can be before it has to be segmented or repeated?






46. The Certkiller network administrator needs to a switch named CK1 to become the root bridge for a redundant path switched network. What can be done to ensure that CK1 will always assume the role as the root bridge?






47. What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?






48. Which of the following services use TCP?






49. Which protocol uses TCP port 443 at layer 4?






50. By default - which of the following factors determines the spanning-tree path cost?