CCNA Quiz 1

CCNA QUIZ 1

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 1.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Which ones are some of the Denial of Service Attacks? (Select three)
A
TCP SYN Flood Attack
B
Smurfing
C
Ping of Death
D
DNS Spoofing
E
ARP Spoofing
Question 2
A VLAN trunked link belong to which VLAN by Default?
A
None of Them
B
VLAN 0
C
VLAN 1
D
All VLANs
E
VLAN 10
Question 3
Dynamic ARP Inspection (DAI) uses Trust states for interfaces. Which ones are these two trust states?
A
Active
B
Inabled
C
Passive
D
Untrusted
E
Trusted
Question 4
Which ones are the benefits of Network Automation? (Select Three)
A
Higher Errors
B
Increased Business Agility
C
Higher Up Times
D
Reduced Operation Costs
E
More Staff Need
Question 5
Which of the following protocols is used to eliminate Layer 2 loops?
A
ARP
B
OSPF
C
STP
D
IP
E
VTP
Question 6
Which one of the following is used to build Switching Table?
A
All of Them
B
Source MAC
C
MAC addresses
D
Source IP
E
Destination IP
Question 7
Neighbour Discovery Protocols work on ....
A
Layer 5
B
Layer 4
C
Layer 2
D
Layer 1
E
Layer 3
Question 8
.... is simply the technical term for a network name.
A
Router-ID
B
WID
C
SSID
D
WLAN-ID
E
VLAN-ID
Question 9
Which ones are true about TCP & UDP?
A
TCP has 8 bits header.
B
UDP has guaranteed trasmission.
C
TCP is a secure protocol UDP is not secure.
D
There is no error checking mechanism in UDP.
E
TCP is slower than UDP.
Question 10
How to enable DHCP Snooping on Cisco devices?
A
ip dhcp snooping
B
ruın dhcp snooping
C
run snooping
D
enable snooping
E
dhcp snooping start
Question 11
Which one is a Distance Vector Protocol?
A
IS-IS
B
BGP
C
OSPF
D
EIGRP
E
RIP
Question 12
QoS .... is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again.
A
Traffic Monitoring
B
Traffic Selecting
C
Traffic Determining
D
Traffic Shaping
E
Traffic Policing
Question 13
Which ones are the Wireless SEcurity Protocols?
A
All of them
B
WPA2 (Wi-Fi Protected Access 2)
C
WEP (Wired Equivalent Privacy)
D
WPA (Wi-Fi Protected Access)
E
WPA3 (Wi-Fi Protected Access 3)
Question 14
Which Artificial Intelligence type is used to create unique content?
Question 15
.... and ... are the Southbound Interface API, that provide the communication of SDN Controller and SDN Data Plane devices.
A
SNMP
B
REST
C
All of them
D
Netconf
E
Open Flow
Question 16
Which ones are  the protocols used between WLC and LWAP? (Select Two)
A
ICMP
B
CDP
C
CAPWAP
D
LWAPP
E
LLDP
Question 17
Which Cisco command shows OSPF neighbor adjacencies?
A
show ip ospf
B
show ip ospf neighbor
C
show ip ospf database
D
debug ip ospf neighbor
E
show protocols
Question 18
Which ones are three important QoS Enemies?
A
Packet Loss
B
CIR
C
Delay
D
Jitter
E
Packet Check
Question 19
How can we turn to Privileged mode from Interface configuration mode on Cisco routers?
A
Ctrl-A
B
Ctrl-Z
C
Ctrl-P
D
Esc
E
Ctrl-Alt-Del
Question 20
IPv6 Link Local Addresses can be configured in two ways. Auto-Address Configuration and Manual Configuration.
A
True
B
False
Question 21
Which ones are FTP port numbers?
A
20
B
21
C
32
D
25
E
15
Question 22
If there are centralized WLAN Controllers in each site and Access Points that are connected to this WLC, this is ...
A
None of them
B
Classic Wireless Network Design
C
Flexconnect Wireless Network Design
D
SD-Access Wireless Network Design
E
Centralized Wireless Network Design
Question 23
Which of the following are Fast Ethernet technologies?
A
100BASE-FX
B
100BASE2
C
100BASE-TX
D
100BASE-5
E
1000BASE-F
Question 24
.... is the attack type in which routing table is manuplated by attackers.
A
Session Hijacking
B
Ping of Death
C
DNS Spoofing
D
Replay Attack
E
Rerouting
Question 25
Which ones are the main characteristic of the REST?
A
All of them
B
Flexible
C
Scalable
D
Lightweight
E
Platform-agnostic
Question 26
How to open debug for nat?
A
run nat
B
debug start nat
C
start nat
D
debug nat stats
E
debug ip nat
Question 27
How to enable syslog on cisco routers?
A
logging run
B
run logging
C
logging on
D
logging start
E
start logging
Question 28
With which mode access point can connect to another access point as a client?
A
Sniffer Mode
B
Client Mode
C
Local Mode
D
Rogue Detector Mode
E
SE-Connect Mode
Question 29
Which ones are two main types of Site to Site VPN?
A
Extranet Based VPN
B
Included Based VPN
C
Excluded Based VPN
D
Internet Based VPN
E
Intranet Based VPN
Question 30
Which Artificial Intelligence type is used to create unique content?
Question 31
Which ones are related to RADIUS? (Select three)
A
Bidirectional CHAP
B
Combined AAA
C
Unidirectional CHAP
D
TCP Port 49
E
UDP Port 1812,1645
Question 32
DSCP bits are ... bits.
A
2
B
3
C
5
D
4
E
6
Question 33
What is the broadcast address for a Class C address of 192.168.145.0 with default Subnet Mask?
A
192.168.145.255
B
192.168.0.0
C
192.168.145.1
D
192.168.145.0
E
192.168.145.254
Question 34
What does a PC broadcast to learn an unknown MAC address?
A
None of Them
B
ICMP Reply
C
ARP Request
D
ARP Reply
E
ICMP Request
Question 35
IP is a Connectionless Protocol.
A
False
B
True
Question 36
For a Class C IPv4 Address, how many usable hosts are there by default?
A
254
B
65536
C
64516
D
255
E
32768
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 36 questions to complete.