CCNA Quiz 1

CCNA QUIZ 1

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 1.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Which ones are the benefits of Network Automation? (Select Three)
A
Increased Business Agility
B
Reduced Operation Costs
C
More Staff Need
D
Higher Up Times
E
Higher Errors
Question 2
Which ones are true about TCP & UDP?
A
TCP has 8 bits header.
B
There is no error checking mechanism in UDP.
C
UDP has guaranteed trasmission.
D
TCP is a secure protocol UDP is not secure.
E
TCP is slower than UDP.
Question 3
With which mode access point can connect to another access point as a client?
A
Rogue Detector Mode
B
SE-Connect Mode
C
Sniffer Mode
D
Local Mode
E
Client Mode
Question 4
Which Artificial Intelligence type is used to create unique content?
Question 5
A VLAN trunked link belong to which VLAN by Default?
A
None of Them
B
VLAN 10
C
All VLANs
D
VLAN 1
E
VLAN 0
Question 6
What does a PC broadcast to learn an unknown MAC address?
A
ICMP Reply
B
ICMP Request
C
ARP Reply
D
ARP Request
E
None of Them
Question 7
What is the broadcast address for a Class C address of 192.168.145.0 with default Subnet Mask?
A
192.168.145.1
B
192.168.145.0
C
192.168.145.254
D
192.168.145.255
E
192.168.0.0
Question 8
How to open debug for nat?
A
run nat
B
debug start nat
C
debug ip nat
D
start nat
E
debug nat stats
Question 9
.... is simply the technical term for a network name.
A
SSID
B
VLAN-ID
C
WLAN-ID
D
Router-ID
E
WID
Question 10
IPv6 Link Local Addresses can be configured in two ways. Auto-Address Configuration and Manual Configuration.
A
True
B
False
Question 11
Which ones are the main characteristic of the REST?
A
Lightweight
B
Flexible
C
Platform-agnostic
D
All of them
E
Scalable
Question 12
Which ones are the Wireless SEcurity Protocols?
A
WPA (Wi-Fi Protected Access)
B
All of them
C
WEP (Wired Equivalent Privacy)
D
WPA2 (Wi-Fi Protected Access 2)
E
WPA3 (Wi-Fi Protected Access 3)
Question 13
.... and ... are the Southbound Interface API, that provide the communication of SDN Controller and SDN Data Plane devices.
A
Netconf
B
All of them
C
REST
D
SNMP
E
Open Flow
Question 14
How to enable syslog on cisco routers?
A
run logging
B
logging run
C
logging start
D
start logging
E
logging on
Question 15
Which Cisco command shows OSPF neighbor adjacencies?
A
show ip ospf
B
show ip ospf database
C
show protocols
D
debug ip ospf neighbor
E
show ip ospf neighbor
Question 16
Which ones are related to RADIUS? (Select three)
A
Combined AAA
B
Unidirectional CHAP
C
TCP Port 49
D
Bidirectional CHAP
E
UDP Port 1812,1645
Question 17
QoS .... is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again.
A
Traffic Monitoring
B
Traffic Selecting
C
Traffic Shaping
D
Traffic Determining
E
Traffic Policing
Question 18
Dynamic ARP Inspection (DAI) uses Trust states for interfaces. Which ones are these two trust states?
A
Trusted
B
Active
C
Untrusted
D
Passive
E
Inabled
Question 19
Which Artificial Intelligence type is used to create unique content?
Question 20
Which ones are some of the Denial of Service Attacks? (Select three)
A
DNS Spoofing
B
Ping of Death
C
Smurfing
D
TCP SYN Flood Attack
E
ARP Spoofing
Question 21
IP is a Connectionless Protocol.
A
True
B
False
Question 22
Which one is a Distance Vector Protocol?
A
EIGRP
B
RIP
C
IS-IS
D
OSPF
E
BGP
Question 23
Which ones are FTP port numbers?
A
25
B
32
C
21
D
20
E
15
Question 24
Which one of the following is used to build Switching Table?
A
Destination IP
B
MAC addresses
C
Source MAC
D
All of Them
E
Source IP
Question 25
Which of the following protocols is used to eliminate Layer 2 loops?
A
OSPF
B
VTP
C
ARP
D
IP
E
STP
Question 26
Which ones are two main types of Site to Site VPN?
A
Included Based VPN
B
Excluded Based VPN
C
Extranet Based VPN
D
Internet Based VPN
E
Intranet Based VPN
Question 27
How can we turn to Privileged mode from Interface configuration mode on Cisco routers?
A
Ctrl-A
B
Ctrl-Alt-Del
C
Ctrl-Z
D
Esc
E
Ctrl-P
Question 28
For a Class C IPv4 Address, how many usable hosts are there by default?
A
255
B
254
C
32768
D
64516
E
65536
Question 29
Which of the following are Fast Ethernet technologies?
A
100BASE-5
B
100BASE2
C
100BASE-FX
D
1000BASE-F
E
100BASE-TX
Question 30
How to enable DHCP Snooping on Cisco devices?
A
ruın dhcp snooping
B
dhcp snooping start
C
enable snooping
D
ip dhcp snooping
E
run snooping
Question 31
If there are centralized WLAN Controllers in each site and Access Points that are connected to this WLC, this is ...
A
Flexconnect Wireless Network Design
B
None of them
C
Classic Wireless Network Design
D
SD-Access Wireless Network Design
E
Centralized Wireless Network Design
Question 32
.... is the attack type in which routing table is manuplated by attackers.
A
Ping of Death
B
Replay Attack
C
Rerouting
D
DNS Spoofing
E
Session Hijacking
Question 33
DSCP bits are ... bits.
A
2
B
4
C
6
D
5
E
3
Question 34
Which ones are three important QoS Enemies?
A
Packet Loss
B
CIR
C
Packet Check
D
Delay
E
Jitter
Question 35
Which ones are  the protocols used between WLC and LWAP? (Select Two)
A
CDP
B
CAPWAP
C
LLDP
D
LWAPP
E
ICMP
Question 36
Neighbour Discovery Protocols work on ....
A
Layer 5
B
Layer 3
C
Layer 2
D
Layer 4
E
Layer 1
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 36 questions to complete.