This site is 100% ad supported. Please add an exception to adblock for this site.

ccna practice exam

Terms

undefined, object
copy deck
http://www.iota-six.co.uk/c/16_binar.htm
http://www.ecse.rpi.edu/Homepages/shivkuma/teaching/sp99/i02_fnd/sld001.htm
http://www.fatkid.com/html/questions.html
http://www.windowsitlibrary.com/Content/405/29/1.html#1
http://www.iota-six.co.uk/c/16_binar.htm
How do we call the layer 3 PDU?
A. Segment
B. Frame
C. Packet
D. Fragment
C. Packet

Explanation:
The network layer has the task of moving the data through the internetwork. It accomplishes this task by encapsulating the data and attaching a header creating a packet (the Layer 3 PDU).
Which of the following are the Cisco suggested advantages of deploying a layering approach in networking?
A. It breaks network communication into smaller simpler parts.
B. It prevents changes in one layer from affecting the other layers, so t
Correct Answer(s):
A. It breaks network communication into smaller simpler parts.
B. It prevents changes in one layer from affecting the other layers, so that they can develop more quickly.
C. It breaks network communication into smaller parts to make learning it easier to understand.
D. It allows different types of network hardware and software to communicate with each other.
E. It standardizes network components to allow multiple-vendor development and support.

Explanation:
All of these are the advantages of the OSI model.
Telnet
Telnet is a terminal emulation protocol, defined in RFC854, for use over a TCP connection. It enables users to login to remote hosts and use their resources from the local host.
How would you copy an image of the IOS to your NVRAM from a tftp server?
A. download NVRAM TFTP
B. download TFTP NVRAM
C. copy tftp startup-config
D. copy startup-config tftp

Correct Answer(s):
C. copy tftp startup-config

Explanation:
The download command is not used in this case, the copy command is. When you issue a copy command, you state the "from" first, then the "to".
What does a layer 3 PDU header include (Choose all that apply)?
A. Destination physical addresses.
B. Source logical addresses.
C. Source physical addresses.
D. Destination logical addresses.
Correct Answer(s):
B. Source logical addresses.
D. Destination logical addresses.

Explanation:
The network layer has the task of moving the data through the internetwork. It accomplishes this task by encapsulating the data and attaching a header creating a packet (the Layer 3 PDU).

Which of the following is the step of encapsulation that ensures the message hosts at both ends of the e-mail system can reliably communicate?
A. Append (add) the local address to the data link header.
B. Append (add) the network address to th
Correct Answer(s):
C. Package the data for end-to-end transport.

Explanation:
Networks must perform these five conversion steps in order to encapsulate data. At this step, the data is packaged for internetwork transport.
UDP
User Datagram Protocol -
A simple protocol that transfers datagram (packets of data) to a remote computer. UDP doesn't guarantee that packets will be received in the same order they were sent. In fact it doesn't guarantee delivery at all.
Which of the following is the step of encapsulation that allows connection to the next directly-connected network device on the link?

A. Append (add) the network address to the header.
B. Package the data for end-to-end transport.
Correct Answer(s):
D. Append (add) the local address to the data link header.

Explanation:
Networks must perform these five conversion steps in order to encapsulate data. At this step, each network device must put the packet into a frame. The frame allows connection to the next directly-connected network device on the link.

Which of the following commands will display your running configuration?
A. show running config
B. show run
C. show running-configuration
D. show running-config
Correct Answer(s):
B. show run
D. show running-config

Explanation:
show run and show running-configuration is not a valid command. Show running config would not work because it lacks a hyphen between the words running and config.
Which of the following is the FINAL step of encapsulation?

A. Package the data for end-to-end transport.
B. Append (add) the local address to the data link header.
C. Convert to bits for transmission.
D. Build the data.
Correct Answer(s):
C. Convert to bits for transmission.

Explanation:
Networks must perform these five conversion steps in order to encapsulate data. The frame must be converted into a pattern of 1s and 0s (bits) for transmission on the medium (usually a wire).
TCP
Transmission Control Protocol -
Like UDP, a protocol that enables a computer to send data to a remote computer. Unlike UDP, TCP is reliable i.e. packets are guaranteed to wind up at their target, at the correct order.
IP
Internet Protocol -
IP is the underline protocol for all the other protocols in the TCP/IP protocol suite. IP defines the means to identify and reach a target computer on the network. Computer in the IP world are identify by unique numbers which are known as IP address
ARP
Address Resolution Protocol -
In order to map an IP address into a hardware address the computer uses the ARP protocol which broadcast a request message that contains an IP address, to which the target computer replies with both the original IP address and the hardware address.
Describe the OSI Seven Layer Model
7) Application : Provides different services to the applications

6) Presentation : Converts the information

5) Session : Handles problems which are not communication issues

4) Transport : Provides end to end communication control

3) Network : Routes the information in the network

2) Data Link : Provides error control between adjacent nodes

1) Physical : Connects the entity to the transmission media
SMTP
Simple Mail Transfer Protocol -
This protocol is dedicated for sending EMail messages originated on a local host, over a TCP connection, to a remote server. SMTP defines a set of rules which allows two programs to send and receive mail over the network. The protocol defines the data structure that would be delivered with information regarding the sender, the recipient (or several recipients) and, of course, the mail's body.
Layer 7:
Layer 6:
Layer 5:
Layer 4:
Layer 3:
Layer 2:
Layer 1:

Layer 7: application layer
Layer 6: presentation layer
Layer 5: session layer
Layer 4: transport layer
Layer 3: network layer
Layer 2: data link layer
Layer 1: physical layer
The information that travels on a network is referred to A. frame set
B. data, a packet, or a data packet.
C. a segment
D. TCP/IP
B. data, a packet, or a data packet.

Explanation:
A data packet is a logically grouped unit of information that moves between computer systems.
Define a "data communications protocol"
A protocol is a set of rules that make communication on a network more efficient.
--or--
A set of rules, or an agreement, that determines the format and transmission of data.
NNTP
Network News Transport Protocol -
A protocol used to carry USENET posting between News clients and USENET servers.
The OSI reference model is a _________ that you can use to understand how ___________ travels throughout a __________.
framework
information
network
Explanation;
The OSI reference model is a framework that you can use to understand how information travels throughout a network.
OSI Reference Model:
>It breaks network communication __________.
>It standardizes network components to ____________.
>It allows different types of network _____ communicate with each other.
>It prevents changes in one
>It breaks network communication into smaller parts to make it easier to understand.
>It standardizes network components to allow multiple-vendor development and support.
>It allows different types of network hardware and software to communicate with each other.
>It prevents changes in one layer from affecting the other layers, so that they can develop more quickly.
>It breaks network communication into smaller parts to make learning it easier to understand.
PPP
Point-to-Point Protocol -
A protocol for creating a TCP/IP connection over both synchronous and asynchronous systems. PPP provides connections for host to network or between two routers, It also has a security mechanism. PPP is well known as a protocol for connections over regular telephone lines using modems on both ends. This protocol is widthly used for connecting personal computers to the internet.
FTP
File Transfer Protocol -
FTP enables transferring of text and binary files over TCP connection. FTP allows to transfer files according to a strict mechanism of ownership and access restrictions. It is one of the most commonly used protocols over the internet now days.
SLIP
Serial Line Internet Protocol -
A point-to-point protocol to use over a serial connection, a predecessor of PPP. There is also an advanced version of this protocol known as CSLIP (compressed serial line internet protocol) which reduce overhead on a SLIP connection by sending just a header information when possible, thus increasing packet throughput
SNMP
Simple Network Management Protocol -
A simple protocol that defines messages related to network management. Through the use of SNMP network devices such as routers can be configured by any host on the LAN.
HTTP
Hyper Text Transport Protocol -
A protocol used to transfer hypertext pages across the world wide web.
What is the purpose of Spanning Tree?

A. To determine broadcast domains
B. To prevent collisions between different switched segments
C. To avoid loops
D. To determine collision domains
Correct Answer(s):
C. To avoid loops

Explanation:
The purpose of Spanning Tree is to avoid loops.
Which of the following correctly describe the OSI reference model (Choose all that apply)?
A. The lower four layers are concerned with data transport issues.
B. The application and presentation layers are concerned with application issues.
Correct Answer(s):
C. The application, presentation, and session layers are concerned with application issues.
D. The lower three layers are concerned with data transport issues.

Explanation:
The application, presentation, and session layers are concerned with application issues. The lower three layers are concerned with data transport issues.

Deck Info

29

permalink