CCNA test 4

Note moyenne : Publié par Edelwess le 13 février 2019

Quiz similaires

Question 1
How many usable IP addresses are available on the network

Question 2
Which subnet would include the address as a usable host address?
Question 3

What single subnet mask would be appropriate to use for the three subnetworks? • • •
Question 4
Which statement is true about variable-length subnet masking?

Each subnet is the same size.
The size of each subnet may be different, depending on requirements.
Subnets may only be subnetted one additional time.
Bits are returned, rather than borrowed, to create additional subnets.
Question 5
Which subnet would include the address as a usable host address?
Question 6
What are two characteristics shared by TCP and UDP? (Choose two.)

Default window size
Connectionless communication
Port numbering
3-way handshake
Ability to to carry digitized voice
Use of checksum
Question 7
Why are port numbers included in the TCP header of a segment?

To indicate the correct router interface that should be used to forward a segment
To identify which switch ports should receive or forward the segment
To determine which Layer 3 protocol should be used to encapsulate the data
To enable a receiving host to forward the data to the appropriate application
To allow the receiving host to assemble the packet in the proper order
Question 8
Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)

Question 9
What is one difference between the client-server and peer-topeer network models?

Only in the client-server model can file transfers occur.
Every device in a peer-to-peer network can function as a client or a server.
A peer-to-peer network transfers data faster than a transfer using a client-server network.
A data transfer that uses a device serving in a client role requires that a dedicated server be present.
Question 10
Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?

Question 11
What network service resolves the URL entered on a PC to the IP address of the destination server?

Question 12
A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?

A change in the bandwidth according to the show interfaces output
A next-hop timeout from a traceroute
An increase in host-to-host ping response times
A change in the amount of RAM according to the show version output
Question 13
Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?

Stateful packet inspection
URL filtering
Application filtering
Packet filtering
Question 14
A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

Leased line
Cable modem
Question 15
What is the purpose of having a converged network?

To provide high speed connectivity to all end devices
To make sure that all types of data packets will be treated equally
To achieve fault tolerance and high availability of data network infrastructure devices
To reduce the cost of deploying and maintaining the communication infrastructure
Question 16
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

Quality of service
Question 17
Which connection provides a secure CLI session with encryption to a Cisco switch?

A console connection
An AUX connection
A Telnet connection
An SSH connection
Question 18
A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address The command is rejected by the device. What is the reason for this?

The command is being entered from the wrong mode of operation.
The command syntax is wrong.
The subnet mask information is incorrect.
The interface is shutdown and must be enabled before the switch will accept the IP address.
Question 19
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored?

The configuration register
A TFTP server
Question 20

The banner message is too long.
The delimiting character appears in the banner message.
The symbol “!” signals the end of a banner message.
Message-of-the-day banners will only appear when a user logs in through the console port.
Question 21
What are three characteristics of an SVI? (Choose three.)

It is designed as a security protocol to protect switch ports.
It is not associated with any physical interface on a switch.
It is a special interface that allows connectivity by different types of media.
It is required to allow connectivity by any device at any location.
It provides a means to remotely manage a switch.
It is associated with VLAN1 by default.
Question 22
A technician configures a switch with these commands:SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address SwitchA(config-if)# no shutdownWhat is the technician configuring?

Telnet access
Password encryption
Physical switchport access
Question 23
In computer communication, what is the purpose of message encoding?

To convert information to the appropriate form for transmission
To interpret information
To break large messages into smaller frames
To negotiate correct timing for successful communication
Question 24
What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

Question 25
What is the process of dividing a data stream into smaller pieces before transmission?

Flow control
Question 26
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

DNS server address
Subnet mask
Default gateway
DHCP server address
Question 27
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

Presentation layer
Network layer
Physical layer
Data link layer
Question 28

A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence t

The amount of traffic that is currently crossing the network
The sophistication of the encapsulation method applied to the data
The type of traffic that is crossing the network
The latency that is created by the number of network devices that the data is crossing
The bandwidth of the WAN connection to the Internet
The reliability of the gigabit Ethernet infrastructure of the backbone
Question 29
Which type of UTP cable is used to connect a PC to a switch port?

Question 30
What is a characteristic of the LLC sublayer?

It provides the logical addressing required that identifies the device.
It provides delimitation of data according to the physical signaling requirements of the medium.
It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.
It defines software processes that provide services to the physical layer.

Infos sur ce quiz

Auteur : Edelwess
Difficulté : MoyenParties jouées :
Intégrer ce quiz sur votre site

Le classement

Score moyen des joueurs : %


Ils y ont joué


Suivez-nous sur Facebook pour rester informé des derniers bons quiz !

Plus de quizz !

Catégorie : Personal
Catégorie : French
Catégorie : Football
Catégorie : History


    L'auteur a désactivé l'ajout de commentaires sur cette page.

    Cookies et données personnelles

    En naviguant sur ce site, vous acceptez notre politique de cookies et de gestion des données personnelles consultable ici.