CCNA Quiz 1

CCNA QUIZ 1

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 1.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Dynamic ARP Inspection (DAI) uses Trust states for interfaces. Which ones are these two trust states?
A
Passive
B
Untrusted
C
Inabled
D
Active
E
Trusted
Question 2
How to enable syslog on cisco routers?
A
run logging
B
logging run
C
logging start
D
start logging
E
logging on
Question 3
How to enable DHCP Snooping on Cisco devices?
A
run snooping
B
dhcp snooping start
C
ruın dhcp snooping
D
ip dhcp snooping
E
enable snooping
Question 4
Which ones are two main types of Site to Site VPN?
A
Extranet Based VPN
B
Excluded Based VPN
C
Included Based VPN
D
Intranet Based VPN
E
Internet Based VPN
Question 5
For a Class C IPv4 Address, how many usable hosts are there by default?
A
255
B
254
C
32768
D
65536
E
64516
Question 6
Which ones are  the protocols used between WLC and LWAP? (Select Two)
A
CDP
B
ICMP
C
LWAPP
D
CAPWAP
E
LLDP
Question 7
How to open debug for nat?
A
start nat
B
run nat
C
debug start nat
D
debug nat stats
E
debug ip nat
Question 8
Which ones are some of the Denial of Service Attacks? (Select three)
A
DNS Spoofing
B
TCP SYN Flood Attack
C
ARP Spoofing
D
Ping of Death
E
Smurfing
Question 9
A VLAN trunked link belong to which VLAN by Default?
A
VLAN 10
B
VLAN 0
C
VLAN 1
D
None of Them
E
All VLANs
Question 10
Which ones are the main characteristic of the REST?
A
Flexible
B
Platform-agnostic
C
Lightweight
D
Scalable
E
All of them
Question 11
Which ones are three important QoS Enemies?
A
Delay
B
Jitter
C
Packet Loss
D
CIR
E
Packet Check
Question 12
Which one is a Distance Vector Protocol?
A
BGP
B
IS-IS
C
EIGRP
D
RIP
E
OSPF
Question 13
IP is a Connectionless Protocol.
A
False
B
True
Question 14
With which mode access point can connect to another access point as a client?
A
Client Mode
B
SE-Connect Mode
C
Local Mode
D
Sniffer Mode
E
Rogue Detector Mode
Question 15
Which ones are the Wireless SEcurity Protocols?
A
WEP (Wired Equivalent Privacy)
B
WPA (Wi-Fi Protected Access)
C
All of them
D
WPA2 (Wi-Fi Protected Access 2)
E
WPA3 (Wi-Fi Protected Access 3)
Question 16
Which ones are the benefits of Network Automation? (Select Three)
A
More Staff Need
B
Higher Errors
C
Higher Up Times
D
Increased Business Agility
E
Reduced Operation Costs
Question 17
Which ones are FTP port numbers?
A
20
B
15
C
21
D
32
E
25
Question 18
Which ones are related to RADIUS? (Select three)
A
UDP Port 1812,1645
B
Combined AAA
C
Bidirectional CHAP
D
Unidirectional CHAP
E
TCP Port 49
Question 19
Which one of the following is used to build Switching Table?
A
Source IP
B
Source MAC
C
Destination IP
D
All of Them
E
MAC addresses
Question 20
Which Artificial Intelligence type is used to create unique content?
Question 21
If there are centralized WLAN Controllers in each site and Access Points that are connected to this WLC, this is ...
A
Flexconnect Wireless Network Design
B
Classic Wireless Network Design
C
Centralized Wireless Network Design
D
None of them
E
SD-Access Wireless Network Design
Question 22
How can we turn to Privileged mode from Interface configuration mode on Cisco routers?
A
Ctrl-Alt-Del
B
Ctrl-P
C
Esc
D
Ctrl-A
E
Ctrl-Z
Question 23
Which Cisco command shows OSPF neighbor adjacencies?
A
show protocols
B
show ip ospf database
C
show ip ospf
D
debug ip ospf neighbor
E
show ip ospf neighbor
Question 24
What does a PC broadcast to learn an unknown MAC address?
A
ARP Request
B
None of Them
C
ICMP Request
D
ARP Reply
E
ICMP Reply
Question 25
IPv6 Link Local Addresses can be configured in two ways. Auto-Address Configuration and Manual Configuration.
A
True
B
False
Question 26
DSCP bits are ... bits.
A
2
B
3
C
4
D
6
E
5
Question 27
QoS .... is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again.
A
Traffic Shaping
B
Traffic Monitoring
C
Traffic Selecting
D
Traffic Policing
E
Traffic Determining
Question 28
What is the broadcast address for a Class C address of 192.168.145.0 with default Subnet Mask?
A
192.168.145.254
B
192.168.145.0
C
192.168.0.0
D
192.168.145.255
E
192.168.145.1
Question 29
Which Artificial Intelligence type is used to create unique content?
Question 30
.... is the attack type in which routing table is manuplated by attackers.
A
Ping of Death
B
DNS Spoofing
C
Session Hijacking
D
Replay Attack
E
Rerouting
Question 31
Which of the following protocols is used to eliminate Layer 2 loops?
A
VTP
B
IP
C
OSPF
D
ARP
E
STP
Question 32
Which ones are true about TCP & UDP?
A
TCP is slower than UDP.
B
TCP has 8 bits header.
C
TCP is a secure protocol UDP is not secure.
D
There is no error checking mechanism in UDP.
E
UDP has guaranteed trasmission.
Question 33
Which of the following are Fast Ethernet technologies?
A
100BASE2
B
100BASE-FX
C
100BASE-TX
D
1000BASE-F
E
100BASE-5
Question 34
Neighbour Discovery Protocols work on ....
A
Layer 4
B
Layer 2
C
Layer 1
D
Layer 3
E
Layer 5
Question 35
.... is simply the technical term for a network name.
A
WLAN-ID
B
VLAN-ID
C
Router-ID
D
SSID
E
WID
Question 36
.... and ... are the Southbound Interface API, that provide the communication of SDN Controller and SDN Data Plane devices.
A
SNMP
B
Netconf
C
Open Flow
D
REST
E
All of them
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 36 questions to complete.