CCNA Quiz 1

CCNA QUIZ 1

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 1.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
IPv6 Link Local Addresses can be configured in two ways. Auto-Address Configuration and Manual Configuration.
A
False
B
True
Question 2
With which mode access point can connect to another access point as a client?
A
SE-Connect Mode
B
Local Mode
C
Client Mode
D
Rogue Detector Mode
E
Sniffer Mode
Question 3
A VLAN trunked link belong to which VLAN by Default?
A
None of Them
B
VLAN 0
C
VLAN 1
D
All VLANs
E
VLAN 10
Question 4
What is the broadcast address for a Class C address of 192.168.145.0 with default Subnet Mask?
A
192.168.145.255
B
192.168.0.0
C
192.168.145.1
D
192.168.145.254
E
192.168.145.0
Question 5
For a Class C IPv4 Address, how many usable hosts are there by default?
A
254
B
65536
C
32768
D
64516
E
255
Question 6
Which ones are two main types of Site to Site VPN?
A
Included Based VPN
B
Internet Based VPN
C
Extranet Based VPN
D
Intranet Based VPN
E
Excluded Based VPN
Question 7
Which ones are FTP port numbers?
A
20
B
21
C
25
D
15
E
32
Question 8
How to enable syslog on cisco routers?
A
logging on
B
start logging
C
logging start
D
logging run
E
run logging
Question 9
Which of the following protocols is used to eliminate Layer 2 loops?
A
STP
B
IP
C
ARP
D
OSPF
E
VTP
Question 10
Neighbour Discovery Protocols work on ....
A
Layer 2
B
Layer 5
C
Layer 3
D
Layer 4
E
Layer 1
Question 11
Which Artificial Intelligence type is used to create unique content?
Question 12
DSCP bits are ... bits.
A
3
B
5
C
6
D
4
E
2
Question 13
How to enable DHCP Snooping on Cisco devices?
A
dhcp snooping start
B
ip dhcp snooping
C
ruın dhcp snooping
D
run snooping
E
enable snooping
Question 14
Which ones are  the protocols used between WLC and LWAP? (Select Two)
A
LLDP
B
CAPWAP
C
LWAPP
D
CDP
E
ICMP
Question 15
QoS .... is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again.
A
Traffic Policing
B
Traffic Determining
C
Traffic Monitoring
D
Traffic Selecting
E
Traffic Shaping
Question 16
.... is simply the technical term for a network name.
A
WID
B
VLAN-ID
C
Router-ID
D
SSID
E
WLAN-ID
Question 17
How can we turn to Privileged mode from Interface configuration mode on Cisco routers?
A
Ctrl-Z
B
Esc
C
Ctrl-A
D
Ctrl-P
E
Ctrl-Alt-Del
Question 18
How to open debug for nat?
A
debug nat stats
B
debug start nat
C
debug ip nat
D
run nat
E
start nat
Question 19
IP is a Connectionless Protocol.
A
True
B
False
Question 20
Which of the following are Fast Ethernet technologies?
A
100BASE-FX
B
100BASE-TX
C
100BASE2
D
100BASE-5
E
1000BASE-F
Question 21
Which Cisco command shows OSPF neighbor adjacencies?
A
show ip ospf database
B
show ip ospf
C
debug ip ospf neighbor
D
show protocols
E
show ip ospf neighbor
Question 22
.... and ... are the Southbound Interface API, that provide the communication of SDN Controller and SDN Data Plane devices.
A
Open Flow
B
REST
C
All of them
D
SNMP
E
Netconf
Question 23
Which one is a Distance Vector Protocol?
A
OSPF
B
BGP
C
EIGRP
D
RIP
E
IS-IS
Question 24
.... is the attack type in which routing table is manuplated by attackers.
A
Session Hijacking
B
Replay Attack
C
Ping of Death
D
Rerouting
E
DNS Spoofing
Question 25
Dynamic ARP Inspection (DAI) uses Trust states for interfaces. Which ones are these two trust states?
A
Passive
B
Untrusted
C
Trusted
D
Inabled
E
Active
Question 26
Which ones are the Wireless SEcurity Protocols?
A
WPA3 (Wi-Fi Protected Access 3)
B
WEP (Wired Equivalent Privacy)
C
WPA2 (Wi-Fi Protected Access 2)
D
All of them
E
WPA (Wi-Fi Protected Access)
Question 27
Which ones are true about TCP & UDP?
A
TCP has 8 bits header.
B
TCP is slower than UDP.
C
UDP has guaranteed trasmission.
D
TCP is a secure protocol UDP is not secure.
E
There is no error checking mechanism in UDP.
Question 28
What does a PC broadcast to learn an unknown MAC address?
A
ICMP Request
B
ICMP Reply
C
ARP Reply
D
None of Them
E
ARP Request
Question 29
Which ones are three important QoS Enemies?
A
Packet Check
B
Packet Loss
C
Delay
D
CIR
E
Jitter
Question 30
Which ones are the main characteristic of the REST?
A
Flexible
B
Lightweight
C
Platform-agnostic
D
All of them
E
Scalable
Question 31
Which one of the following is used to build Switching Table?
A
Source MAC
B
All of Them
C
Destination IP
D
MAC addresses
E
Source IP
Question 32
Which ones are the benefits of Network Automation? (Select Three)
A
Higher Up Times
B
Reduced Operation Costs
C
Increased Business Agility
D
Higher Errors
E
More Staff Need
Question 33
If there are centralized WLAN Controllers in each site and Access Points that are connected to this WLC, this is ...
A
None of them
B
Centralized Wireless Network Design
C
Classic Wireless Network Design
D
Flexconnect Wireless Network Design
E
SD-Access Wireless Network Design
Question 34
Which ones are related to RADIUS? (Select three)
A
UDP Port 1812,1645
B
TCP Port 49
C
Bidirectional CHAP
D
Unidirectional CHAP
E
Combined AAA
Question 35
Which ones are some of the Denial of Service Attacks? (Select three)
A
DNS Spoofing
B
ARP Spoofing
C
TCP SYN Flood Attack
D
Ping of Death
E
Smurfing
Question 36
Which Artificial Intelligence type is used to create unique content?
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 36 questions to complete.