0

CCNA (NCO)

Description: The test contains questions based on CCNA.
Number of Questions: 25
Created by:
Tags: CCNA CCNA/MCSE
Attempted 0/25 Correct 0 Score 0

IM is a real-time text communication between two or more users. IM stands for

  1. Instant Mail

  2. Instant Messaging

  3. Internet Messaging

  4. Intranet Messaging

  5. Internet Messaging


Correct Option: B
Explanation:

It is the correct full form of IM.

A process in which all messages are broken into smaller pieces that can be easily transported together across a medium is called

  1. multiplexing

  2. multitasking

  3. encapsulation

  4. segmentation

  5. decapsulation


Correct Option: D
Explanation:

A process in which all messages are broken into smaller pieces that can be easily transported together across a medium is called segmentation.

Which type of intermediary devices connect end users to the network?

  1. Intermediary devices

  2. Communication servers

  3. Security devices

  4. Network access devices

  5. Modems


Correct Option: D
Explanation:

Network access devices connect end users to the network.

Channel, encoder, decoder, transmitter and receiver are main elements of network communication. Which of the following is the correct sequence of the given elements?

  1. Channel - Encoder - Decoder - Transmitter - Receiver

  2. Encoder - Transmitter - Channel - Decoder - Receiver

  3. Encoder - Channel - Transmitter - Decoder - Receiver

  4. Encoder - Transmitter - Channel - Receiver - Decoder

  5. Transmitter - Encoder - Channel - Decoder - Receiver


Correct Option: B
Explanation:

It is the correct sequence. In this process, a message is encoded by the encoder, which is transmitted by the transmitter. After that, through the channel it is sent to the decoder where decoder decodes that message and sends it to the the receiver.

Which of the following statements is incorrect about TCP/IP model?

  1. The TCP/IP model is a reference model.

  2. TCP/IP is an open standard, which means that one company does not control it.

  3. Application layer of TCP/IP model works similar to the application layers of application, presentation and session layers of OSI models.

  4. Application, transport, internet and network are four layers of TCP/IP model.

  5. The TCP/IP model defines the four communication functions that protocols perform.


Correct Option: A
Explanation:

It is an incorrect statement. The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols within the TCP/IP suite.

Which port number is used by HTTP protocol?

  1. Port 53

  2. Port 80

  3. Post 67

  4. Port 110

  5. Port 25


Correct Option: B
Explanation:

HTTP protocol uses port 80.

Which of the following is incorrect about OSI model?

  1. OSI stands for Open System Internet.

  2. The OSI model is an internetwork reference model developed by the International Organisation for Standardisation (ISO).

  3. The OSI model is used for referring to the process of communication, not to regulate it.

  4. In OSI model, communication process begins at the application layer of the source and data is passed down to each lower layer to be encapsulated with the supporting data until it reaches the physical layer and is put out on the media.

  5. Each layer provides data services to the layer directly above by preparing information coming down the model or going up.


Correct Option: A
Explanation:

It is an incorrect full form of OSI since OSI stands for Open Systems Interconnection.

Which protocol data unit (PDU) is used in transport layer?

  1. Data PDU

  2. Packet PDU

  3. Frame PDU

  4. Segment PDU

  5. Bits PDU


Correct Option: D
Explanation:

It is a transport layer PDU.

Ports 20 and 21 are used by

  1. FTP protocol

  2. Telnet

  3. Post Office Protocol

  4. Simple Mail Transfer Protocol

  5. Domain Name System


Correct Option: A
Explanation:

FTP protocol uses ports 20 and 21.

Which of the following is a TCP protocol?

  1. Trivial File Transfer Protocol (TFTP)

  2. Internet Relay Chat (IRC)

  3. Routing Information Protocol (RIP)

  4. Real-Time Transport Protocol (RTP)

  5. Session Initiation Protocol (SIP)


Correct Option: B
Explanation:

It is a TCP protocol.

Which of the following is incorrect about TCP protocol?

  1. TCP protocol is a connection oriented protocol.

  2. TCP does not resend any data segments that are not acknowledged as being received at the destination.

  3. TCP does not pass data to the network until it knows that the destination is ready to receive it.

  4. TCP uses a mechanism of the three-way handshake, timers, acknowledgments and dynamic windowing to achieve reliable features.

  5. TCP provides congestion control through the use of flow control and dynamic window sizes.


Correct Option: B
Explanation:

It is an incorrect answer since TCP manages the flow of the data and resends any data segments that are not acknowledged as being received at the destination.

Which of the following is incorrect about UDP protocol?

  1. UDP is a connectionless protocol that provides the basic transport layer functions.

  2. UDP is transaction based protocol.

  3. UDP reassembles the data in the order that it was received and forwards it to the application.

  4. UDP has more overhead than TCP protocol.

  5. UDP stands for User Datagram Protocol.


Correct Option: D
Explanation:

It is an incorrect statement. UDP has lower overhead than TCP since it is not connection oriented and does not provide the sophisticated retransmission, sequencing and flow control mechanisms.

Which of the following is not a task of OSI network layer?

  1. Segmentation

  2. Encapsulation

  3. Routing

  4. Addressing packets with an IP address

  5. Decapsulation


Correct Option: A
Explanation:

It is not the task of OSI network layer since it is a task which is performed by OSI transport layer.

Which of the following is incorrect about IPv4 protocol?

  1. IPv4 is a Network Layer Protocol used as a basic protocol of the internet.

  2. IPv4 is a media independent protocol.

  3. The IPv4 protocol describes services and packet structure that are used to encapsulate UDP datagrams or TCP segments handed down from the transport layer of the OSI model.

  4. IPv4 is a reliable protocol.

  5. IPv4 is a connectionless protocol.


Correct Option: D
Explanation:

It is an incorrect statement about IPv4 protocol.

Which of the following is incorrect about static routing?

  1. A static routing is a routing where route information can be manually configured on the router.

  2. Static routing does not require a network administrator for initial setup and for any changes to the routes.

  3. Static routing is very reliable and the router does not use much overhead to process the packets.

  4. Static routing does not update automatically and has higher continuing administrative costs.

  5. An example of static routing is default routing.


Correct Option: B
Explanation:

It is incorrect.

Which of the following is an example of broadcasting communication?

  1. Mapping upper-layer addresses to lower-layer addresses

  2. Routing information exchange by some routing protocols

  3. Newsfeed

  4. Distribution of software

  5. Video and audio broadcast


Correct Option: A
Explanation:

It is an example of broadcasting communication.

Which of the following is incorrect about unicasting communication?

  1. The communication using a unicast packet can be forwarded through an internetwork using different addresses.

  2. The process of sending a packet from one host to an individual host is called unicasting.

  3. Unicasting is the host-to-host communication in both a client/server and a peer-to-peer network.

  4. In unicasting, the host addresses assigned to the two end devices are used as the source and destination of IPv4 addresses.

  5. Unicasting places the IPv4 address of the destination host in the packet header as the destination address.


Correct Option: A
Explanation:

It is an incorrect answer since the communication using a unicast packet can be forwarded through an internetwork using the same address.

A special address used to send data to all hosts in the network is called

  1. host address

  2. broadcast address

  3. network address

  4. destination address

  5. IP address


Correct Option: B
Explanation:

A special address used to send data to all hosts in the network is called broadcast address.

The cables and connectors used to interconnect network devices are called

  1. physical media

  2. peers

  3. physical topology

  4. physical address

  5. pads


Correct Option: A
Explanation:

Physical media is the cables and connectors used to interconnect the network devices.

Address block 169.254.0.0–169.254.255.255 or 169.254.0.0/16 is used by which address?

  1. Loopback address

  2. Link-local address

  3. Default route address

  4. Test-net address

  5. Experimental address


Correct Option: B
Explanation:

Link-local addresses are available in address block 169.254.0.0–169.254.255.255 or 169.254.0.0/16.

The frame payload is stored in which field(s) of a typical frame?

  1. Quality field

  2. Type field

  3. Addressing or naming field: the destination and/or source devices

  4. Data field

  5. Start and stop indicator fields


Correct Option: D
Explanation:

Data field stores the frame payload.

Which of the following is incorrect about ISP?

  1. ISP is an internet service provider which provides Domain Name System (DNS) services, email services, etc. to the customers.

  2. Tier 2 ISPs tend to provide services to retail and home markets in a specific locale.

  3. ISPs are designated by a hierarchy based on their level of connectivity to the internet backbone.

  4. At the top of the ISP hierarchy are tier 1 ISPs which provide reliability and high speed services to the customers.

  5. ISP supplies a small number of usable IPv4 addresses (6 or14) to its customers as a part of its services.


Correct Option: B
Explanation:

It is an incorrect statement about ISP.

A process used by a switch or bridge to forward broadcasts and unknown destination unicasts is called

  1. forwarding

  2. flow control

  3. fragmentation

  4. flooding

  5. filtering


Correct Option: D
Explanation:

A process used by a switch or bridge to forward broadcasts and unknown destination unicasts is called flooding.

Which of the following is not a characteristic of controlled access MAC method?

  1. Only one station transmits at a time.

  2. Devices wanting to transmit FDDI must wait for their turn.

  3. Some networks use token passing.

  4. Collisions exist in this method.

  5. Token Ring and FDDI use this method.


Correct Option: D
Explanation:

It is not a characteristic of controlled access MAC method since there is no collision in this method.

A dotted decimal number that helps to identify the structure of IP addresses is called

  1. subnet

  2. subnet mask

  3. slash format

  4. octal number

  5. binary number


Correct Option: B
Explanation:

Subnet mask is a dotted decimal number that helps to identify the structure of IP addresses.

- Hide questions