CCNA ICND 1 Part 2 quiz assesses knowledge on common components in IT devices, router functions, and routing processes. It evaluates understanding of routing tables, path determination, and packet handling, crucial for network configuration and troubleshooting.
Printer
Console
Network
CD-ROM
USB
Rate this question:
Routers maintain their routing tables and ensure that other routers know of changes in the network
Routers use the routing table to determine where to forward packets
Routers strengthen the signal over large distances in a network
Routers create larger collision domains
Routers use ICMP to communicate network information from their own routing table with other routers
Rate this question:
Routers evaluate the available paths to a destination
The routing process uses metrics and administrative distances when evaluating network paths
Dynamic routing occurs when the network admin configures information on each router
Dynamic routing when the information is learned using routing information that is obtained from routing protocols
A default route holds an explicit route to every network
The routing table holds multiple entries per network
Rate this question:
IP address
MAC address
Routing table
Routing protocol
Rate this question:
Routing provide an ordered list of known network addresses
Routing tables are maintained through the transmission of MAC addresses
Routing tables contain metrics that are used to determine the disirability of the route
Routing table associations tell a router that a particular destination is either directly connected to the router or that it can be reached via another router (the next hop router) on the wat to the final destination
When a router recieves an incoming packet, it uses the source address and searches the routing table to find the best path for the data from that source
Routing tables are used to compare which routing protocols allow reaching the destination network
Rate this question:
Hop count
Bandwith
Delay
Packet length
Distance
Quantity
Rate this question:
RIP was developed by Cisco to address the issues that are associated with routing in medium-sized LAN's
Examples of this protocol include RIP
This protocol determines the direction (vector) and distance (hop count) to any network in the internetwork
A router needs to know the entire path to every network segment
This process is also known as "routing by rumor"
Routers that are running the distance vector routing protocol send periodic updates only when there are changes in the network
Rate this question:
The link-state database is used to calculate the paths with the highest bandwidths on the network
Link-State routing protocols respond quickly to network changes
In link-state routing protocols, each router periodically sends messages to the network, listing the routers to which it is directly connected and also information about whether the link to each router is active
LS routing protocols send periodic updates (LS refreshes) at long time intervals, approx once every 30 mins
In LS routing protocols, every router tries to build it's own internal map of the network topology
LS routing protocols send periodic detailed routing tables eeven tho network changes have occurred
Rate this question:
Base-10 system
Decimal system
Numeric system
Binary system
Rate this question:
32-bit binary numbers
16-bit decimal numbers
8-bit binary numbers
Eight sets of 4-bit decimal numbers
Rate this question:
1
2
3
4
Rate this question:
1
2
3
4
Rate this question:
58
60
62
66
Rate this question:
253
254
255
256
Rate this question:
2
4
6
8
Rate this question:
Mask and host bits
Host and network bits
Host and subnet bits
Network and subnet bits
Rate this question:
Sends the packet back to the sender
Passes the packet to the next router in the hierarchy
Adds that number to its table
Discards the packet
Rate this question:
255.255.0.0
255.255.255.254
255.128.0.0
255.0.0.0
Rate this question:
11111111.00000000.00000000.00000000
11111111.11111111.010000000.00000000
11111111.11111111.11111111.000000000
255.255.224.0
Rate this question:
172.17.128.47
172.17.128
172.17
10.172.47
Rate this question:
Subtract the value of subnets that you need from the host portion
Add the bit values from the right to the left until the total (decimal value) is just greatere than the number of subnets that you need
Add the bit values from left to right until the total (decimal value) is just greater thatn the number of subnets that you need
Subtract the number of subnets that you need from the network portion
Rate this question:
Presst he reset button
Turn the power switch to on
Connect the fiber cable to another router
Attach the power cable plug to the router power supply socket
Rate this question:
Cisco IOS software debug messages
The diagnostic console menu
Cisco IOS software output text
A graphical picture showing the real time status of the LED
Rate this question:
To display the current router config
To complete hardware and interface testing
To bring up a minimal feature config
To fully configure a Cisco router for IP routing
Rate this question:
You cannot configure anything; the user mode commands are used to display information
The user EXEC mode allows you to perform lgobal config tasks that affect the entire router
The user EXEC mode commands allow you to enter a secret password so that you can configure the router
The user EXEC mode commands allow you to configure interfaces, subinterfaces, lines, and routers
Rate this question:
Exit
Quit
Disable
Userexec
Rate this question:
Current (running) configuration in RAM
System hardware and names of configuration files
Amount of NVRAM used to store the configuration
Version of Cisco IOS software running on the router
Rate this question:
Show version
Show interfaces
Show startup-config
Show runnning-config
Rate this question:
The router returns you to user EXEC mode
The router returns a list of possible commands
The router invokes a global config command
The router switches you from one config mode to another
Rate this question:
Hostname hostname
Banner motd message
Hostname interface description
Description interface description
Rate this question:
Enter the enable secret command
Enter the enable password command
Enter either enable secret or enable password commands
Enter both the enable secret and enable password commands
Rate this question:
Set exec timeout 15 30
Console timeout 15 30
Timeout 15 30
Exec-timeout 15 30
Rate this question:
Interface serial 0-0-1
Interface serial 0 0 1
Interface serial 0/0/1
Interface serial 0/0-1
Rate this question:
Clock rate 64
Clock speed 64
Clock rate 64000
Clock speed 64000
Rate this question:
The clock rate has not been set
The interface has been manually disabled
No cable is attached to the serial interface
There are no keepalives
There is a mismatch in the encapsulation type
Rate this question:
DHCP dynamically assigns hostnames to client devices
DHCP dynamically assigns IP addresses to client devices
DHCP dynamically assigns a default gateway to client devices
DHCP dynamically assigns security access level to client devices
Rate this question:
It is a complete DHCP server
Its support is limited to assigning IP addresses to clients
It must obtain its DHCP information from a master DHCP server
It has limited DHCP support and can only assign IP addresses and default gateways to clients
Rate this question:
Pool name
Lease time
Domain name
Default router
DNS server address
WINS server address
DHCP network and subnet
Starting and ending addresses
Rate this question:
Sh ip dhcp bindings
Sh ip dhcp database
Sh ip dhcp mapping
Sh ip dhcp conflicts
Rate this question:
SSH
SDM
Ping
Telnet
Traceroute
Rate this question:
Show user
Show telnet
Show sessions
Show connections
Rate this question:
End keyword
Suspend keyword
Ctrl-Shift-6 key sequence
Ctrl-Shift-Del Key sequence
Rate this question:
The companies in which WAN's are implemented usually own the WAN's
WAN's connect devices that are separated by a wide geographical area
WAN's use the services of carries such as telephone companies, cable companies, satellite systems, and network providers
WAN's generally carry limited types of data at high speeds
WAN's use serial connections of various types to provide access to bandwidth
WAN's connect devices that are in small geographic areas
Rate this question:
A WAN transmits data faster than a LAN
A LAN transmits data faster than a WAN
While a LAN connects computers, peripherals, and other devices in a single building or other small geographic area, a WAN transmits data across broad geographic distances
A company or organization usually owns the hardware and software required for WAN's
LAN's span large geographic areas if a LAN administrator configures them correctly
Rate this question:
Workers in a small business need to be able to communicate and sharedata with each other
Admin staff within a school needs to share schedule information with teachers
Organizations often want to share information with other organizations over across large distances
A department needs to share large data files quickly
Students need to do research for classes by accessing library indexes and publications that are located in other parts of their country and in other parts of the world
Workers within a branch of a large company need to share project data with each other
Rate this question:
Layer 1
Layer 2
Layer 3
Layer 4
Rate this question:
Layer 1
Layer 2
Layer 3
Layer 4
Rate this question:
Many data link layer protocols use a framing mechanism similar to HDLC
Data link Layer protocols determine the cable type to be used in the WAN
ICMP is an example of a data link protocol
Data link layer protocols define how data is encapsulated for transmission to remote sites, and also the mechanisms for transferring the resulting frames to establish the connection across the communication line from the sending to the receiving device
RIP is an example of data-link protocol
Rate this question:
Quiz Review Timeline (Updated): Jul 13, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.