CCNA Quiz 1

CCNA QUIZ 1

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 1.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Which ones are two main types of Site to Site VPN?
A
Internet Based VPN
B
Excluded Based VPN
C
Extranet Based VPN
D
Included Based VPN
E
Intranet Based VPN
Question 2
.... is the attack type in which routing table is manuplated by attackers.
A
Ping of Death
B
Session Hijacking
C
Replay Attack
D
Rerouting
E
DNS Spoofing
Question 3
Which Artificial Intelligence type is used to create unique content?
Question 4
With which mode access point can connect to another access point as a client?
A
Sniffer Mode
B
Local Mode
C
SE-Connect Mode
D
Rogue Detector Mode
E
Client Mode
Question 5
Which Artificial Intelligence type is used to create unique content?
Question 6
Which one of the following is used to build Switching Table?
A
MAC addresses
B
All of Them
C
Destination IP
D
Source MAC
E
Source IP
Question 7
Neighbour Discovery Protocols work on ....
A
Layer 4
B
Layer 1
C
Layer 2
D
Layer 3
E
Layer 5
Question 8
Which ones are the benefits of Network Automation? (Select Three)
A
Higher Errors
B
Increased Business Agility
C
More Staff Need
D
Reduced Operation Costs
E
Higher Up Times
Question 9
Which ones are three important QoS Enemies?
A
Packet Loss
B
Packet Check
C
Jitter
D
CIR
E
Delay
Question 10
How to enable syslog on cisco routers?
A
logging start
B
logging on
C
start logging
D
run logging
E
logging run
Question 11
Which ones are the Wireless SEcurity Protocols?
A
WEP (Wired Equivalent Privacy)
B
All of them
C
WPA (Wi-Fi Protected Access)
D
WPA3 (Wi-Fi Protected Access 3)
E
WPA2 (Wi-Fi Protected Access 2)
Question 12
Which of the following protocols is used to eliminate Layer 2 loops?
A
VTP
B
OSPF
C
ARP
D
IP
E
STP
Question 13
DSCP bits are ... bits.
A
5
B
6
C
2
D
3
E
4
Question 14
Which ones are FTP port numbers?
A
15
B
20
C
25
D
21
E
32
Question 15
If there are centralized WLAN Controllers in each site and Access Points that are connected to this WLC, this is ...
A
Classic Wireless Network Design
B
Flexconnect Wireless Network Design
C
None of them
D
SD-Access Wireless Network Design
E
Centralized Wireless Network Design
Question 16
Which of the following are Fast Ethernet technologies?
A
100BASE-TX
B
100BASE-FX
C
100BASE-5
D
1000BASE-F
E
100BASE2
Question 17
Which ones are related to RADIUS? (Select three)
A
UDP Port 1812,1645
B
Combined AAA
C
Bidirectional CHAP
D
TCP Port 49
E
Unidirectional CHAP
Question 18
Which ones are the main characteristic of the REST?
A
Scalable
B
All of them
C
Lightweight
D
Flexible
E
Platform-agnostic
Question 19
How to enable DHCP Snooping on Cisco devices?
A
enable snooping
B
ip dhcp snooping
C
ruın dhcp snooping
D
dhcp snooping start
E
run snooping
Question 20
IPv6 Link Local Addresses can be configured in two ways. Auto-Address Configuration and Manual Configuration.
A
True
B
False
Question 21
Which ones are  the protocols used between WLC and LWAP? (Select Two)
A
LLDP
B
CDP
C
CAPWAP
D
LWAPP
E
ICMP
Question 22
Which Cisco command shows OSPF neighbor adjacencies?
A
show ip ospf neighbor
B
debug ip ospf neighbor
C
show ip ospf database
D
show protocols
E
show ip ospf
Question 23
.... and ... are the Southbound Interface API, that provide the communication of SDN Controller and SDN Data Plane devices.
A
Netconf
B
All of them
C
SNMP
D
Open Flow
E
REST
Question 24
A VLAN trunked link belong to which VLAN by Default?
A
None of Them
B
VLAN 0
C
All VLANs
D
VLAN 10
E
VLAN 1
Question 25
Dynamic ARP Inspection (DAI) uses Trust states for interfaces. Which ones are these two trust states?
A
Untrusted
B
Trusted
C
Passive
D
Inabled
E
Active
Question 26
Which one is a Distance Vector Protocol?
A
RIP
B
EIGRP
C
IS-IS
D
OSPF
E
BGP
Question 27
Which ones are some of the Denial of Service Attacks? (Select three)
A
Smurfing
B
ARP Spoofing
C
TCP SYN Flood Attack
D
DNS Spoofing
E
Ping of Death
Question 28
What is the broadcast address for a Class C address of 192.168.145.0 with default Subnet Mask?
A
192.168.145.0
B
192.168.145.254
C
192.168.145.255
D
192.168.0.0
E
192.168.145.1
Question 29
QoS .... is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again.
A
Traffic Selecting
B
Traffic Shaping
C
Traffic Determining
D
Traffic Monitoring
E
Traffic Policing
Question 30
.... is simply the technical term for a network name.
A
SSID
B
WID
C
Router-ID
D
VLAN-ID
E
WLAN-ID
Question 31
Which ones are true about TCP & UDP?
A
UDP has guaranteed trasmission.
B
There is no error checking mechanism in UDP.
C
TCP is slower than UDP.
D
TCP has 8 bits header.
E
TCP is a secure protocol UDP is not secure.
Question 32
For a Class C IPv4 Address, how many usable hosts are there by default?
A
32768
B
64516
C
254
D
255
E
65536
Question 33
What does a PC broadcast to learn an unknown MAC address?
A
ARP Request
B
ARP Reply
C
ICMP Reply
D
ICMP Request
E
None of Them
Question 34
How to open debug for nat?
A
debug start nat
B
debug ip nat
C
debug nat stats
D
run nat
E
start nat
Question 35
IP is a Connectionless Protocol.
A
False
B
True
Question 36
How can we turn to Privileged mode from Interface configuration mode on Cisco routers?
A
Ctrl-Alt-Del
B
Ctrl-A
C
Esc
D
Ctrl-P
E
Ctrl-Z
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 36 questions to complete.