CCNA Quiz 5

CCNA QUIZ 5

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 5.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Which ones are the port roles used in DHCP Snooping?
A
Standard Ports
B
Passive Ports
C
Untrusted Ports
D
Active Ports
E
Trusted Ports
Question 2
What is the name of the connector used with Copper Ethernet Cable?
A
DCE
B
RJ 45
C
None of them
D
RJ 50
E
RS-232
Question 3
Network operating system works on .... Plane of SDN.
A
None of them
B
Management
C
Data
D
Control
E
Forwarding
Question 4
DR and BDR are used with which Routing Protocol?
A
RIP
B
BGP
C
OSPF
D
IS-IS
E
EIGRP
Question 5
Which ACL uses Source IP, Destination IP, Port and Protocol for Filtering?
A
Extended
B
Standard
Question 6
How to delete all the records in CDP table?
A
undo cdp
B
delete cdp
C
clear cdp table
D
delete cdp table
E
undo cdp table
Question 7
Switches forwards Packets based on IP Addresses. (True or False)
A
True
B
False
Question 8
Which one is standard based VLAN Tagging protocol?
A
STP
B
ICMP
C
MD5
D
ISL
E
DOT1Q
Question 9
Which ones are the correct order of RPVST+ States?
A
Blocking, Learning, Forwarding, Disabled
B
Forwarding, Disabled, Blocking, Learning
C
Learning, Forwarding, Disabled, Blocking,
D
Learning, Disabled, Blocking, Forwarding
E
Learning, Blocking,, Forwarding, Disabled
Question 10
How to check syslog information?
A
show all logs
B
show logs
C
show logging
D
show log table
E
shoe log details
Question 11
Which ones are some of the constraints of REST APIs?
A
Layered System
B
All of them
C
Client/Server
D
Code on Demand
E
Uniform Interface
Question 12
Opportunistic Wireless Encryption is one of the improvements coming with ...
A
WEP
B
WPA1
C
WPA2
D
WPA
E
WPA3
Question 13
How to limit MAC address number for a an interface as maximum 5 MAC?
A
port-security 5
B
port-security maximum 5
C
switchport port-security 5
D
switchport port-security maximum 5
E
switchport maximum 5
Question 14
Which ones are NTP Device Roles?
A
NTP Active
B
NTP Passive
C
NTP Server
D
NTP Client/Server
E
NTP Client
Question 15
UDP is a protocol that is ... and ...
A
Slow
B
Fast
C
Reliable
D
Unreliable
Question 16
Which ones are related to TACACS+(Select three)
A
Supports 15 Priviledge modes
B
Only password encryption
C
Uses UDP
D
Uses TCP
E
Full packet encryption
Question 17
BE, AF, EF codes are deterimned by .... in DSCP bits.
A
Traffic Classification
B
Drop Probability
C
Traffic Policing
D
Class Selector Codepoint
E
None of them
Question 18
Maksimum Packet Size that can be sent without Fragmentation is ....
A
MTU
B
BPDU
C
Packet Size
D
Packet Length
E
LSA
Question 19
What is the transmission capacity of a medium?
A
PDU
B
Bandwidth
C
MTU
D
Hop Count
E
Cost
Question 20
.... is the attack type that is sued by the attackers to check a backdoor in the victim’s system.
A
Session Hijacking
B
ARP Spoofing
C
DNS Spoofing
D
Port Scanning
E
Smurfing
Question 21
What is the other name of Administrative Distance?
A
Preference
B
Cost
C
Priority
D
Hop Count
E
All of them
Question 22
Which one translate host names to IP addresses?
A
DHCP
B
ICMP
C
DNS
D
ARP
E
BGP
Question 23
The protocols used between WLC and LWAP are LWAPP and CAPWAP. This protocols work with ...
A
UDP
B
TCP
C
SCTP
Question 24
.... stores configuration of a router.
A
TFTP Server
B
NVRAM
C
RAM
D
ROM
E
Flash
Question 25
How to create ip nat pool IPCISCO for ip address range 10.10.10.1-10.10.10.10
A
ip nat pool IPCISCO 10.10.10.1 10.10.10.10 netmask
B
ip pool IPCISCO 10.10.10.1 10.10.10.10 netmask
C
ip nat pool 10.10.10.1 10.10.10.10 netmask
D
ip nat pool 10.10.10.1 10.10.10.10
E
ip pool IPCISCO 10.10.10.1 10.10.10.10
Question 26
Which one is the simplest QoS Service Model?
A
AF3
B
EF
C
AF2
D
AF1
E
Best Effort
Question 27
Whic AP Mode is used to detect malicious AP?
A
Bridge Mode
B
Monitor Mode
C
Rogue Detector Mode
D
REAP/H-REAP Mode
E
Client Mode
Question 28
Which ones are two of the REST API information parameters?
A
Path
B
Tag
C
End
D
Option
E
Body
Question 29
Which ones are the properties of Link State Routing Protocols?
A
Knows entire topolgy
B
Fast Convergence
C
Susceptible to routing loops
D
Slow Convergence
E
sends only link state info
Question 30
Which one use Three-Way Handshake for session establishment?
A
TCP
B
RSTP
C
UDP
D
OSPF
E
RIP
Question 31
In .... Mode, both transmitting and receiving device can communicate at the same time.
A
Full Duplex
B
Half Duplex
Question 32
Which ones are some of the the Man-in-the-Middle Attacks? (Select three)
A
Replay Attacks
B
Ping of Death
C
Teardrop Attack
D
DNS Spoofing
E
Session Hijacking
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 32 questions to complete.