CCNA Quiz 5

CCNA QUIZ 5

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 5.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Which one is standard based VLAN Tagging protocol?
A
DOT1Q
B
ICMP
C
MD5
D
ISL
E
STP
Question 2
Opportunistic Wireless Encryption is one of the improvements coming with ...
A
WPA2
B
WPA
C
WPA3
D
WPA1
E
WEP
Question 3
Which ones are some of the the Man-in-the-Middle Attacks? (Select three)
A
Teardrop Attack
B
Ping of Death
C
Session Hijacking
D
Replay Attacks
E
DNS Spoofing
Question 4
Which ones are NTP Device Roles?
A
NTP Active
B
NTP Passive
C
NTP Client
D
NTP Client/Server
E
NTP Server
Question 5
The protocols used between WLC and LWAP are LWAPP and CAPWAP. This protocols work with ...
A
TCP
B
UDP
C
SCTP
Question 6
What is the other name of Administrative Distance?
A
All of them
B
Priority
C
Preference
D
Hop Count
E
Cost
Question 7
Which ones are some of the constraints of REST APIs?
A
Layered System
B
All of them
C
Uniform Interface
D
Code on Demand
E
Client/Server
Question 8
How to check syslog information?
A
show log table
B
show logs
C
show logging
D
show all logs
E
shoe log details
Question 9
How to limit MAC address number for a an interface as maximum 5 MAC?
A
switchport port-security 5
B
port-security 5
C
switchport port-security maximum 5
D
switchport maximum 5
E
port-security maximum 5
Question 10
What is the name of the connector used with Copper Ethernet Cable?
A
RS-232
B
None of them
C
DCE
D
RJ 50
E
RJ 45
Question 11
What is the transmission capacity of a medium?
A
Cost
B
Hop Count
C
Bandwidth
D
MTU
E
PDU
Question 12
.... is the attack type that is sued by the attackers to check a backdoor in the victim’s system.
A
Session Hijacking
B
Port Scanning
C
ARP Spoofing
D
DNS Spoofing
E
Smurfing
Question 13
Maksimum Packet Size that can be sent without Fragmentation is ....
A
MTU
B
Packet Length
C
BPDU
D
LSA
E
Packet Size
Question 14
Which ones are related to TACACS+(Select three)
A
Only password encryption
B
Full packet encryption
C
Supports 15 Priviledge modes
D
Uses UDP
E
Uses TCP
Question 15
Which ones are the properties of Link State Routing Protocols?
A
sends only link state info
B
Knows entire topolgy
C
Susceptible to routing loops
D
Slow Convergence
E
Fast Convergence
Question 16
DR and BDR are used with which Routing Protocol?
A
EIGRP
B
OSPF
C
BGP
D
RIP
E
IS-IS
Question 17
Which ones are the correct order of RPVST+ States?
A
Blocking, Learning, Forwarding, Disabled
B
Learning, Forwarding, Disabled, Blocking,
C
Forwarding, Disabled, Blocking, Learning
D
Learning, Disabled, Blocking, Forwarding
E
Learning, Blocking,, Forwarding, Disabled
Question 18
How to delete all the records in CDP table?
A
undo cdp table
B
undo cdp
C
delete cdp table
D
clear cdp table
E
delete cdp
Question 19
UDP is a protocol that is ... and ...
A
Unreliable
B
Reliable
C
Slow
D
Fast
Question 20
Switches forwards Packets based on IP Addresses. (True or False)
A
False
B
True
Question 21
.... stores configuration of a router.
A
Flash
B
ROM
C
RAM
D
NVRAM
E
TFTP Server
Question 22
Whic AP Mode is used to detect malicious AP?
A
Rogue Detector Mode
B
Client Mode
C
REAP/H-REAP Mode
D
Bridge Mode
E
Monitor Mode
Question 23
Which one use Three-Way Handshake for session establishment?
A
RIP
B
TCP
C
OSPF
D
RSTP
E
UDP
Question 24
How to create ip nat pool IPCISCO for ip address range 10.10.10.1-10.10.10.10
A
ip pool IPCISCO 10.10.10.1 10.10.10.10
B
ip nat pool 10.10.10.1 10.10.10.10 netmask
C
ip pool IPCISCO 10.10.10.1 10.10.10.10 netmask
D
ip nat pool 10.10.10.1 10.10.10.10
E
ip nat pool IPCISCO 10.10.10.1 10.10.10.10 netmask
Question 25
Which ones are two of the REST API information parameters?
A
End
B
Body
C
Option
D
Path
E
Tag
Question 26
BE, AF, EF codes are deterimned by .... in DSCP bits.
A
Traffic Policing
B
Traffic Classification
C
Drop Probability
D
Class Selector Codepoint
E
None of them
Question 27
Network operating system works on .... Plane of SDN.
A
Forwarding
B
Management
C
Control
D
Data
E
None of them
Question 28
Which one translate host names to IP addresses?
A
ARP
B
DNS
C
BGP
D
ICMP
E
DHCP
Question 29
In .... Mode, both transmitting and receiving device can communicate at the same time.
A
Full Duplex
B
Half Duplex
Question 30
Which one is the simplest QoS Service Model?
A
AF3
B
AF1
C
EF
D
AF2
E
Best Effort
Question 31
Which ones are the port roles used in DHCP Snooping?
A
Active Ports
B
Standard Ports
C
Passive Ports
D
Untrusted Ports
E
Trusted Ports
Question 32
Which ACL uses Source IP, Destination IP, Port and Protocol for Filtering?
A
Extended
B
Standard
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 32 questions to complete.